Configuring user authorization (Security file)

IBM Workload Scheduler manages security through the use of a configuration file, the security file. In the security file, you specify which scheduling objects a user can manage and how. You define these settings by writing user definitions. A user definition is an association between a name and a set of users, the objects they can access, and the actions they can perform on the specified objects.

For more detailed information about the security file, security file syntax, and how to configure the security file, see Configuring user authorization (Security file).

The following table displays the access keywords required to grant authorization to access and work with SAP scheduling objects assigned to IBM Workload Scheduler users.

Table 1. Access keywords for activities with SAP scheduling objectsThis table shows access keywords for activities with SAP scheduling objects
Activity Access keywords required
Dynamic Workload Console Define or search for SAP jobs on an extended agent workstation. display on the workstation
Retrieve the spool list on an extended agent workstation. display on the workstation
Rerun from a step on an extended agent. rerun on the job
Define or search for SAP jobs on a dynamic agent workstation, pool, or dynamic pool. display and run on the workstation
Retrieve the spool list on a dynamic agent workstation, pool, or dynamic pool. display and run on the job
Rerun from a step on a dynamic agent workstation, pool, or dynamic pool. rerun on the job