Information on securing the product
Comprehensive security for
Endevorconsists of data set security and functional security.
Address security during the final testing of your first
Endevorapplication. The initial setup and testing steps for implementing a new application should not be disrupted by overly restrictive security rules.
- Data Set Securityprevents unauthorized access to the data sets thatEndevoruses.Endevoralone doesnotprovide data set security. Data set security is performed by a site security package, such asACF2,Top Secret, or IBM RACF. You can use the following methods to implement data set security: program path protection, standard data set protection, or standard data set protection with theEndevoralternate ID feature. The alternate ID is strongly recommended.
- Functional SecurityprotectsEndevorinventory functions from unauthorized access.Endevorprovides customized functional security through the External Security Interface (ESI) and your site security package (ACF2,Top Secret, or RACF). ESI lets you store security rules under your site security package. You can secure the following functions: access to Environments, primary and foreground menu options, action authorization, Package actions, and concurrent action processing authorization.