Step 18: Define Security
| SysOps | ProcOps |
|---|---|
| ✓ | ✓ |
Perform this step to ensure that only authorized staff can manage the resources in your environment.
Your operations staff and automation facilities at SA z/OS-controlled systems need to be authorized to manage the resources in their environment. You can control human and automation operator authority through the password security provided by either by NetView or an SAF-based security product, such as RACF®.
Refer to the Security and Authorization and complete all SAF relevant actions that secure the infrastructure appropriately.
For a basic security setup consult the following subchapters:
See also the following sections in Security and Authorization for other security options:
- Other Security Options
- Securing Focal Point Systems and Target Systems
- Granting NetView and the STC-User Access to Data Sets
- Restricting Access to INGPLEX and INGCF Functions
- Restricting Access to Joblog Monitoring Task INGTJLM
- Security considerations to control Db2 subsystems
- Security for IBM Tivoli Monitoring Products (OMEGAMON)
- Controlling Access to the Processor Hardware Functions
- Establishing Authorization with Network Security Program
Note: To plan your RMTCMD-based INGSEND security, see the discussion of RMTCMD security features in
the NetView documentation.