Previous Topic: Screen Level Protection (SLP)Next Topic: Establish JES Ownership


JES Resource Protection

When setting up JES security, your security policy should have addressed questions such as:

These questions help you pinpoint which JES resources it is important to control access to at your site. You can use CA Top Secret to control access to these JES resources:

The JES2 CA Top Secret Connection

At various points during processing, JES2 passes information to SAF. When SAF receives the request: