Setting up security for BMC II for z/OS resources
This section describes how to plan for and implement security for the BMC Impact Integration for z/OS product.
Planning-your-security-implementation
Determining-conventions-for-resource-names
Defining-the-security-parameters
Identifying-the-security-class-to-your-ESM
Identifying-and-protecting-resources-that-need-security
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*