O'Reilly logo

JES3 to JES2 Migration Considerations by Tom Wasik, John Unterholzner, John A. O'Leary, Brad Habbershaw, Bruce Dennis, Karan Singh, Frank Kyne

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security considerations
This chapter describes the security-related aspects of replacing JES3 with JES2. The focus will be on protecting JES-managed resources, rather than on giving JES access to the resources it needs.
z/OS JES2 Initialization and Tuning Guide, SA22-7532 and z/OS JES3 Initialization and Tuning Guide, SA22-7549 provide detailed information about securing the JES environment using both JES and RACF facilities.
We discuss any RACF entries required during a conversion from JES3 to JES2 and it assumes that the same RACF database will ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required