Limiting access to ETA
This section describes the procedures for limiting access to ETA.
By default, access to many ETA functions is unlimited. To restrict product usage, you must take steps to protect the functions that you want to restrict.
Under most circumstances, you do not have to set security when initially installing ETA. Therefore, you may want to defer setting security until you have reviewed the various security methods.
ETA allows you to secure product features through either of the following methods:
User access profiles
If you decide to secure product features through user access profiles, you must first establish administrator authority to create and change user access profiles. After you establish administrator authority for appropriate users, you can use UPF security to create and maintain user access profiles. For more information about establishing administrator authority and using UPF, see Implementing-user-access-profiles-and-UPF-security-EXTENDED-TERMINAL-ASSIST-PLUS-customization.
A System Authorization Facility (SAF) interface to RACF or an equivalent product
For more information about securing product features through a SAF interface, see Implementing-a-SAF-interface-to-RACF-or-equivalent-product-BMC-AMI-Extended-Terminal-Assist-for-IMS-customization.
Unless you use one of these methods to control use of product features, access to ETA and use of its features is effectively unlimited. The approaches to internal security are mutually exclusive.
Related topic