z/OS JES2 Introduction
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Providing security

z/OS JES2 Introduction
SA32-0994-00

Security in a data processing environment involves controlling and auditing access to resources that are important to your installation. In the JES2 environment, these resources include:
  • JES2-owned data sets
  • Input (from nodes, remote workstations, readers, offload devices, and commands)
  • Job names
  • System input/output residing on spool (SYSIN/SYSOUT)
  • Output (to nodes, printers, punches, remote workstations, and offload devices).

JES2 provides a basic level of security for some of these resources through initialization statements. For example, each node in a network can be defined as having a certain level of control over work at each of the other nodes in the system, which can give one operator limited control over each of the other nodes.

The control available through initialization statements can be broadened by implementing several JES2 exits available for this purpose. You can implement a more complete security policy by using the system authorization facility (SAF) component of the base control program and a security product such as Resource Access Control Facility (RACF®). SAF provides a link to the security product to define any additional security controls your installation may require.

JES2 passes information to SAF to perform password validation, to request authority to access a resource, and to determine security information in various environments. When SAF and the security product indicate a decision on a security request, JES2 bypasses its own security processing.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014