Examples of security strategies

You can implement security in Tivoli Workload Scheduler for z/OS in many ways. This section shows you two extreme examples:

Your security strategy probably falls somewhere between these two extremes.