Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Userids z/OS MVS Planning: Operations SA23-1390-00 |
|
The first thing to consider are userids. Each operator needs an individual userid that appropriately restricts access to controlled functions. Most security products control access based on the userid that is logged on to the console, not the console itself. Controlling access is very difficult unless LOGON(REQUIRED) is in effect. |
Copyright IBM Corporation 1990, 2014
|