z/OS JES2 Initialization and Tuning Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Security considerations

z/OS JES2 Initialization and Tuning Guide
SA32-0991-00

In networking, you must:
  • Secure the node, which involves ensuring the proper nodes and users have access to the network
  • Secure the data, which involves ensuring that if an unauthorized node or userid intercepts the data, that data is not usable by the interceptor.
You should protect your resources at different levels. Security mechanisms include:
  • RACF® (or an equivalent security product) -- Each node in the network should use RACF to protect its local resources. See Providing security for JES2 for information on implementing security for your network.
  • SSL (secure socket layer) -- NJE/TCP network can have SSL or Transport Layer Security (TLS) defined for nodes.
  • Encryption.
  • JES2 passwords.
  • JES2 exits.
  • Security authorization facility (SAF) exits.
  • SMF exits.
  • MVS™ exits and modifications.

In larger networks, implementing security is most commonly done at the points where subnets interconnect, besides the individual node security. Therefore, it is important that the gateway nodes in the network enforce the proper level of security. NJE Installation contains a complete discussion of security in large networks.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014