Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Planning for security z/OS Security Server RACF Security Administrator's Guide SA23-2289-00 |
|
You and your JES system programmer should develop a security plan for JES. Together, you should determine
which resources you want to protect and decide who should have access
to those resources. Your security plan should address questions such
as:
You must gather a great deal of information from your JES system programmer about specific resources and access requirements. If JES2 is installed on your system, the JES system programmer should use z/OS JES2 Initialization and Tuning Guide. If JES3 is installed on your system, the JES system programmer should use z/OS JES3 Initialization and Tuning Guide. |
Copyright IBM Corporation 1990, 2014
|