Examples of security strategies
You can implement security in Tivoli Workload Scheduler for z/OS in many ways. This section shows you two extreme examples:
- A centralized strategy in which all security functions are controlled at a central site using fixed resources
- A decentralized strategy in which most security functions are delegated to end users, and many subresources are defined.
Your security strategy probably falls somewhere between these two extremes.