
Accessing unauthorized z/OS native WLM services on Liberty
To enable access to unauthorized z/OS® native WLM services, you use the Liberty zosWlm-1.0 feature, and enable Liberty to use the native LE WLM services, such as ConnectWorkMgr, createWorkUnit, deleteWorkUnit, extractWorkUnit, joinWorkUnit and leaveWorkUnit.
Before you begin
For code examples, and for information about configuration syntax, classification rules, and the attributes of the httpClassification element, see WLM classification for z/OS.
Procedure
- Enable the Liberty zosWlm-1.0 feature.
- Define a security profile for the FACILITY class and profile "BPX.WLMSERVER" that allows the user associated with the server READ access. This enables the Liberty server to use the native LE WLM services, such as ConnectWorkMgr, createWorkUnit, deleteWorkUnit, extractWorkUnit, joinWorkUnit and leaveWorkUnit.
Example
The "subsystem name" used for classifying work requests is BBGZSRV, and it is specified on the WLM Connect Service ConnectWorkMgr.
The collectionName is supplied as the "COLLECTION" value on the Classify work (__server_classify).
This example shows how the value used for the collectionName can be specified:
<zosWorkloadManager collectionName="AbcDef1234"/>
Note: The collectionName supports mixed case.
Note: The collectionName only uses the first 18
characters.
Note: If no value is specified, the value ${wlp.server.name} is used. This is the directory name
of the server.