How to control User access to z/OS through the Zowe Desktop
Product: ACF2
There is no separate Zowe security configuration required. User access is controlled by adding users to the appropriate z/OSMF roles via IZUUSER or IZUADMIN groups.
Since the authorization is driven by z/OSMF SAF; users would have all the same access in Zowe Desktop Explorers that they already have when they use TSO.