User access to z/OS through the Zowe Desktop
search cancel

User access to z/OS through the Zowe Desktop

book

Article ID: 426483

calendar_today

Updated On:

Products

ACF2 - z/OS Zowe

Issue/Introduction

How to control User access to z/OS through the Zowe Desktop 

 

Environment

Product: ACF2

Resolution

There is no separate Zowe security configuration required. User access is controlled by adding users to the appropriate z/OSMF roles via IZUUSER or IZUADMIN groups.
Since the authorization is driven by z/OSMF SAF; users would have all the same access in Zowe Desktop Explorers that they already have when they use TSO.