Previous Topic

Next Topic

Book Contents

Book Index

Implementing Control-M Security

This section describes the steps required to implement the Control‑M security interface.

The Control-M security interface can be installed either as part of the customized installation path, or during the Customization process after installation. Both options use the INCONTROL Installation and Customization Engine (ICE) application. If you are not familiar with the ICE interface, see the INCONTROL for z/OS Installation Guide: Installing. Perform all the steps required to implement Control-M security at your site.

If CMEM is installed at your site, perform all the steps required to implement CMEM security at your site.

To install the Control-M security interface

  1. Enter the main ICE screen.
  2. Select Customization.
  3. Enter CTM in the Product field.
  4. Select Security Customization.
  5. Perform all major and minor steps required to install the security product.

Parent Topic

Control-M Security