Step 11. Other z/OS Security Requirements |
Scroll |
While some security authorization requirements are specific to the type of source datastores to be captured, other requirements apply to all components. See the z/OS Security Requirements section below or the Security Authorization Quickstart for details.