Addressing security requirements
Addressing security requirements
During configuration of server-side components, it is necessary to configure various system security settings. Your organization may require your security administrator to complete steps to configure Zowe security. As a system administrator/programmer, first consult with your security administrator before you start the installation process.
This article addresses configuring Zowe security during the Zowe z/OS components installation process, and does not address security configuration to extend Zowe. For more information about security configuration to extend Zowe, see the following articles:
Tasks performed by your security administrator
To configure Zowe security, your organization's security administrator is required to perform various tasks. Some of the tasks apply to general Zowe configuration, while other tasks are required during installation if you plan to use specific Zowe components or features.
The following required configuration tasks are performed by your organization's security administrator during the post-installation configuration:
- Initialize Zowe security configurations
- Perform APF authorization of load libraries
- Configure the z/OS system for Zowe
- Configure address space job naming
- Assign security permissions of users
If your Zowe server-side installation includes the features listed in the following table, consult your security administrator to perform the associated security tasks after installation:
Assign security permissions to users
As a security administrator, assign users (ZWESVUSR
and ZWESIUSR
) and the ZWEADMIN
security group permissions required to perform specific tasks.
For more information about assigning these permissions, see Assigning security permissions to users.