z/OS Common Information Model User's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


CIM provider setup and security

z/OS Common Information Model User's Guide
SC34-2671-00

CIM provider setup and security

This topic describes additional security and setup requirements for providers:

__   1.
__   2.
__   3.
Job, Cluster, and Monitoring providers

(see z/OS Management Instrumentation for CIM)

__   4.
Cluster, CoupleDataset, and JES2-JES3Jobs providers

(see Setting up the CIM server for Cluster, CoupleDataset, and JES2-JES3Jobs providers)

__   5.
__   6.
Storage management providers

(see Setting up the CIM server for storage management)

__   7.
Optionally, you can run providers in a designated user context

(see Running providers in a designated user context)

__   8.
Optionally, you can choose the provider based authorization model

(see Utilizing the provider based authorization model)

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014