Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
CIM provider setup and security z/OS Common Information Model User's Guide SC34-2671-00 |
|
CIM provider setup and securityThis topic describes additional security and setup requirements for providers: __ 1. RMF™ provider
__ 2. Network providers
__ 3. Job, Cluster, and Monitoring providers
__ 4. Cluster, CoupleDataset, and JES2-JES3Jobs providers
(see Setting up the CIM server for Cluster, CoupleDataset, and JES2-JES3Jobs providers) __ 5. WLM provider
__ 6. Storage management providers
__ 7. Optionally, you can run providers in a designated user
context
__ 8. Optionally, you can choose the provider based authorization
model
|
Copyright IBM Corporation 1990, 2014
|