Configuring user authorization (Security file)
IBM Workload Scheduler manages security through the use of a configuration file, the security file. In the security file, you specify which scheduling objects a user can manage and how. You define these settings by writing user definitions. A user definition is an association between a name and a set of users, the objects they can access, and the actions they can perform on the specified objects.
For more detailed information about the security file, security file syntax, and how to configure the security file, see Configuring user authorization (Security file).
The following table displays the access keywords required to grant authorization to access and work with SAP scheduling objects assigned to IBM Workload Scheduler users.
Activity | Access keywords required | |
---|---|---|
Dynamic Workload Console | Define or search for SAP jobs on an extended agent workstation. | display on the workstation |
Retrieve the spool list on an extended agent workstation. | display on the workstation | |
Rerun from a step on an extended agent. | rerun on the job | |
Define or search for SAP jobs on a dynamic agent workstation, pool, or dynamic pool. | display and run on the workstation | |
Retrieve the spool list on a dynamic agent workstation, pool, or dynamic pool. | display and run on the job | |
Rerun from a step on a dynamic agent workstation, pool, or dynamic pool. | rerun on the job |