Zero-Configuration Security for z/OS Storage Management
If they aren’t authorized in your environment, they aren’t authorized in UDM. No exceptions. No workarounds.
See how UDM security enforcement happens in real time without adding a single new rule.
Trial UDM for free
