(E)JES Security

You can tailor (E)JES to meet the security requirements of your system and the needs of your users. For example, you can decide which columns of information on a panel each user sees and what those columns are named. You can also control:

  • Who can use (E)JES
  • Which users can issue (E)JES control commands
  • Which users can issue system commands
  • Which jobs users can manage
  • Which jobs and output you want displayed on (E)JES panels
  • Which users can display output data sets

You can implement these controls:

  • Through the System Authorization Facility (SAF) interface and an external security program such as RACF
  • By coding parameters in the (E)JES internal security module
  • Using a combination of both

» (E)JES