Step 7. Setting up the RACF environment
If your installation protects data and resources from unauthorized use, you must define IBM Z Workload Scheduler to your security system. This section assumes that the Resource Access Control Facility (RACF®) is installed and active on your z/OS system. It describes the activities you must perform to define and enable the security environment for IBM Z Workload Scheduler.
For detailed plans and instructions about how to establish a security strategy for your IBM Z Workload Scheduler resources, see Customization and Tuning.