Previous Topic: Using NEXTKEYNext Topic: COUPLE Command


Suggested Rules for Sensitive Commands

Implementing specific CA ACF2 for z/ VM features and carefully following certain procedures assures security requirements are met. Recommended settings for CP commands are described in the following sections.