Start of changeIBM Workload Automation, Version 9.3

Defining and managing IBM Workload Scheduler role-based security

You can define and update your security file according to role-based security model, by using the Manage Workload Security interface from Dynamic Workload Console or the composer command-line program.

With the role-based security model you can update your security file with the security objects that you define in the master domain manager database, in a quick and easy way. Enable the role-based security model by setting the optman enRoleBasedSecurityFileCreation global option to yes.

According to the role-based security model, the security objects that you can define are:
Security roles
Each role represents a certain level of authorization and includes the set of actions that users or groups can do.
Security domains
Each domain represents the set of scheduling objects that users or groups can manage.
Access control lists
Each access control list is defined assigning roles to users or groups, on a certain security domain.

When the security file is updated on the master domain manager, the security settings on the master domain manager are automatically synchronized with the backup master domain manager.

For more information, see Getting started with security.



End of change