The following books contain planning information for automation and illustrate sample automated operational scenarios using IBM Systems Management products:

TME 10 NetView Automation Guide, SC31-8225

Integrated Centralized Automation/Advanced Operation, GG24-2599

Using the products below to support operational tasks will allow you to support growing workloads, as well as growing numbers of OS/390 images, in an efficient manner.

TME 10 Operations Planning and Control (TME 10 OPC) automates the scheduling and (if required) rerun of batch workloads. TME 10 OPC allows you to define your batch scheduling requirements and will develop a schedule of when batch applications will run, and where. It will also monitor the real-time environment and notify you of deviations from the schedule. It can schedule work across multiple OS/390 images, as well as other platforms such as AIX, UNIX, Windows NT, and OS/400.

Data Facility Systems Managed Storage/MVS (DFSMS) allows the definition of data classes and associating data sets with those classes, and will carry automate data set allocation, migration, and backup actions specified in the class definitions.

Adstar Distributed Storage Manager (ADSM) allows using OS/390 as a repository to contain backup and archived data from other operating system platforms, and to carry out the required backup/archiving actions without manual intervention.

30.6Security Management

30.6.1 Overview

Who the valid users of a system are, and what resources they are permitted to use, are the foundation of security management.

Implementation of an overall system security philosophy requires identification of system users and the resources they have access to, and what should happen (if anything) when an unauthorized user attempts access to a secured resource. If this design is done as the system is being installed and implemented, it is a series of small increments rather than a major undertaking.

Remember that even in a highly secure system, some users must be trusted. The security administration processes should be established with adequate controls and backups.

30.6.2 Tasks

Security management involves the application of security policies through functions such as:

Policy definition - creation, deletion, and control of security services and mechanisms.

Monitoring - distribution of security relevant information.

Event or exception reporting - reporting security-relevant events.

468VSE to OS/390 Migration Workbook

Page 492
Image 492
IBM OS/390 manual Security Management Overview, Tasks

OS/390 specifications

IBM OS/390, a versatile operating system, was a cornerstone in enterprise environments and played a pivotal role in mainframe computing. Released in the mid-1990s, OS/390 combined the strengths of IBM's MVS (Multiple Virtual Storage) with new features and enhancements, targeting scalability, reliability, and performance in demanding business applications.

One of the key features of OS/390 was its robust support for multiple users and processes. The system allowed thousands of concurrent users to access applications and data, ensuring high availability and minimizing downtime—a critical requirement for many large organizations. This scalability was supported through various enhancements in memory management and processor scheduling, enabling optimal resource allocation across diverse workloads.

OS/390 was known for its superior workload management capabilities. The Workload Manager (WLM) component allowed administrators to define service policies, specifying how system resources would be allocated according to the priority of tasks. This ensured that critical business processes received the necessary resources while less critical tasks were managed more flexibly.

Another significant characteristic of OS/390 was its commitment to security. The operating system provided comprehensive security features, including user authentication, data encryption, and auditing capabilities. This focus on security was vital for organizations handling sensitive data, ensuring compliance with regulations and safeguarding against unauthorized access.

OS/390 also supported advanced technologies that facilitated integration and development. The system included features like the IBM CICS (Customer Information Control System) for transaction processing and IMS (Information Management System) for database management. These technologies allowed organizations to build robust, high-performance applications tailored to specific business needs.

The ease of network integration was another strength of OS/390. With the advent of the Internet and global connectivity, OS/390 systems could easily interface with various network protocols, enabling businesses to operate in a connected world. This inclusion paved the way for many organizations to expand their capabilities and offer new services, driving digital transformation.

In conclusion, IBM OS/390 represented a significant advancement in mainframe technology, combining scalability, security, and robust workload management. Its rich feature set and support for critical enterprise applications solidified its role as a vital component of many organizations' IT infrastructures, ensuring they could meet their operational challenges head-on while supporting future growth. As technology continues to evolve, the legacy of OS/390 remains influential in the realm of computing.