Setting up the CIM server for WLM management
The z/OS Workload Manager (WLM) subsystem is represented in z/OS
CIM through class IBMzOS_WLM.
The provider serving class IBMzOS_WLM requires UPDATE access
to resources which are protected by profile MVSADMIN.WLM.POLICY in
class FACILITY.
- Permit access to MVSADMIN.WLM.POLICY by either permitting the
requestor's user ID access to the discrete profile MVSADMIN.WLM.POLICY,
or to one of the generic umbrella profiles MVSADMIN.WLM.* or MVSADMIN.*
, depending on your system's current security definitions.
- Either, grant the requestor's user ID UPDATE access
to the discrete RACF® profile
MVSADMIN.WLM.POLICY in class FACILITY.
Example:
SETROPTS CLASSACT(FACILITY) RACLIST(FACILITY)
PERMIT MVSADMIN.WLM.POLICY CLASS(FACILITY) ID(<client-ID>) ACCESS(UPDATE)
SETROPTS RACLIST(FACILITY) REFRESH
- Or, grant the requestor's user ID UPDATE access to
generic RACF profile MVSADMIN.WLM.*
in class FACILITY.
Example:
SETROPTS CLASSACT(FACILITY) RACLIST(FACILITY) GENERIC(FACILITY)
PERMIT MVSADMIN.WLM.* CLASS(FACILITY) ID(<client-ID>) ACCESS(UPDATE)
SETROPTS RACLIST(FACILITY) REFRESH
- If your system's environment is set up for program control, the
load module BLDUXTID in SYS1.MIGLIB needs to be program controlled.
The following example shows how you can enable program control for
load module BLSUXTID.
Example:
RDEFINE PROGRAM BLSUXTID
RALT PROGRAM BLSUXTID ADDMEM('SYS1.MIGLIB'/'******'/NOPADCHK) +
UACC(READ)
SETROPTS WHEN(PROGRAM) REFRESH
A complete example for the security setup required by the CIM provider
for class IBMzOS_WLM is provided in the z/OS CIM sample security
setup job CFZSEC, step ENWLM.
More information:
|