Please enable JavaScript to view this site.

Navigation: Installation > z/OS Installation > Product Installation using JCL

Step 11. Other z/OS Security Requirements

Scroll

While some security authorization requirements are specific to the type of source datastores to be captured, other requirements apply to all components. See the z/OS Security Requirements section below or the Security Authorization Quickstart for details.