diff --git a/workflows/files/ZWECONF.properties b/workflows/files/ZWECONF.properties index 1e62abf35a..7ed87a211e 100644 --- a/workflows/files/ZWECONF.properties +++ b/workflows/files/ZWECONF.properties @@ -62,27 +62,10 @@ zowe_setup_dataset_authLoadlib=IBMUSER.ZWEV2.SZWEAUTH # APF authorized LOADLIB for Zowe ZIS Plugins zowe_setup_dataset_authPluginLib=IBMUSER.ZWEV2.CUST.ZWESAPL -# zowe_setup_certificate_type -# Label: Zowe setup certificate type -# Abstract: Type of certificate storage. -# Category: zowe -# Description: -# Type of certificate storage. Valid values are: PKCS12, JCEKS, JCECCAKS, JCERACFKS, JCECCARACFKS, or JCEHYBRIDRACFKS -# Choices: PKCS12,JCEKS,JCECCAKS,JCERACFKS,JCECCARACFKS,JCEHYBRIDRACFKS -zowe_setup_certificate_type=PKCS12 - -# zowe_setup_certificate_pkcs12_directory -# Label: Zowe setup certificate PKCS12 directory -# Abstract: Keystore directory -# Category: zowe -# Description: -# Keystore directory -zowe_setup_certificate_pkcs12_directory=/var/zowe/keystore - # zowe_setup_vsam_mode # Label: Zowe setup VSAM mode # Abstract: VSAM data set with Record-Level-Sharing enabled or not -# Category: zowe +# Category: components # Description: # VSAM data set with Record-Level-Sharing enabled or not # Choices: NONRLS,RLS @@ -91,7 +74,7 @@ zowe_setup_vsam_mode=NONRLS # zowe_setup_vsam_volume # Label: Zowe setup VSAM volume # Abstract: Volume name if you are using VSAM in NONRLS mode -# Category: zowe +# Category: components # Description: # Volume name if you are using VSAM in NONRLS mode zowe_setup_vsam_volume= @@ -99,7 +82,7 @@ zowe_setup_vsam_volume= # zowe_setup_vsam_storageClass # Label: Zowe setup VSAM storage class # Abstract: Storage class name if you are using VSAM in RLS mode -# Category: zowe +# Category: components # Description: # Storage class name if you are using VSAM in RLS mode zowe_setup_vsam_storageClass= @@ -194,7 +177,7 @@ zowe_launchScript_CompConf=warn # zowe_certificate_keystore_type # Label: Zowe certificate keystore type # Abstract: Certificate keystore type (PKCS12, JCEKS, JCECCAKS, JCERACFKS, JCECCARACFKS, or JCEHYBRIDRACFKS) -# Category: zowe +# Category: certificates # Description: # Certificate keystore type (PKCS12, JCEKS, JCECCAKS, JCERACFKS, JCECCARACFKS, or JCEHYBRIDRACFKS) # Choices: PKCS12,JCEKS,JCECCAKS,JCERACFKS,JCECCARACFKS,JCEHYBRIDRACFKS @@ -202,8 +185,8 @@ zowe_certificate_keystore_type=PKCS12 # zowe_certificate_keystore_file # Label: Zowe certificate keystore file -# Abstract: Zowe certificate keystore file -# Category: zowe +# Abstract: Zowe certificate keystore file. In case of keyring the format is "safkeyring://OWNER/KEYRING". +# Category: certificates # Description: # Zowe certificate keystore file zowe_certificate_keystore_file=/global/zowe/keystore/localhost/localhost.keystore.p12 @@ -211,7 +194,7 @@ zowe_certificate_keystore_file=/global/zowe/keystore/localhost/localhost.keystor # zowe_certificate_keystore_password # Label: Zowe certificate keystore password # Abstract: Certificate keystore password. -# Category: zowe +# Category: certificates # Description: # Certificate keystore password. zowe_certificate_keystore_password=password @@ -219,23 +202,24 @@ zowe_certificate_keystore_password=password # zowe_certificate_keystore_alias # Label: Zowe certificate keystore alias # Abstract: Alias for the certificate keystore -# Category: zowe +# Category: certificates # Description: # Alias for the certificate keystore zowe_certificate_keystore_alias=localhost # zowe_certificate_truststore_type # Label: Zowe certificate truststore type -# Abstract: zowe_certificate_truststore_type -# Category: zowe +# Abstract: Zowe certificate truststore type +# Category: certificates # Description: -# zowe_certificate_truststore_type +# Zowe certificate truststore type +# Choices: PKCS12,JCEKS,JCECCAKS,JCERACFKS,JCECCARACFKS,JCEHYBRIDRACFKS zowe_certificate_truststore_type=PKCS12 # zowe_certificate_truststore_file # Label: Zowe certificate truststore file -# Abstract: File location for the certificate truststore -# Category: zowe +# Abstract: File location for the certificate truststore. In case of keyring the format is "safkeyring://OWNER/KEYRING". +# Category: certificates # Description: # File location for the certificate truststore zowe_certificate_truststore_file=/global/zowe/keystore/localhost/localhost.truststore.p12 @@ -243,7 +227,7 @@ zowe_certificate_truststore_file=/global/zowe/keystore/localhost/localhost.trust # zowe_certificate_truststore_password # Label: Zowe certificate truststore password # Abstract: Password for the certificate truststore -# Category: zowe +# Category: certificates # Description: # Password for the certificate truststore zowe_certificate_truststore_password=password @@ -251,7 +235,7 @@ zowe_certificate_truststore_password=password # zowe_certificate_pem_key # Label: Zowe certificate PEM key # Abstract: Path to the Zowe certificate PEM key -# Category: zowe +# Category: certificates # Description: # Path to the Zowe certificate PEM key zowe_certificate_pem_key=/global/zowe/keystore/localhost/localhost.key @@ -259,7 +243,7 @@ zowe_certificate_pem_key=/global/zowe/keystore/localhost/localhost.key # zowe_certificate_pem_certificate # Label: Zowe certificate PEM certificate # Abstract: Path to the PEM certificate -# Category: zowe +# Category: certificates # Description: # Path to the PEM certificate zowe_certificate_pem_certificate=/global/zowe/keystore/localhost/localhost.cer @@ -267,7 +251,7 @@ zowe_certificate_pem_certificate=/global/zowe/keystore/localhost/localhost.cer # zowe_certificate_pem_certificateAuthorities # Label: Zowe certificate PEM certificate authorities # Abstract: zowe_certificate_pem_certificateAuthorities -# Category: zowe +# Category: certificates # Description: # zowe_certificate_pem_certificateAuthorities zowe_certificate_pem_certificateAuthorities=/global/zowe/keystore/local_ca/local_ca.cer @@ -275,7 +259,7 @@ zowe_certificate_pem_certificateAuthorities=/global/zowe/keystore/local_ca/local # zowe_verifyCertificates # Label: Zowe verify certificates # Abstract: Zowe certificate verification -# Category: zowe +# Category: certificates # Description: # Zowe certificate verification # Choices: STRICT,NONSTRICT,DISABLED @@ -746,4 +730,77 @@ zowe_rbacProfileId=1 # Category: zowe # Description: # ID when determining for purposes such as to allow multiple copies of Zowe to be used within the same client -zowe_cookieId=1 \ No newline at end of file +zowe_cookieId=1 + +# zowe_setup_security_product +# Label: Security product name +# Abstract: Security product name. Can be RACF, ACF2 or TSS +# Category: security +# Description: +# Security product name. Can be RACF, ACF2 or TSS +# Choices: RACF,TSS,ACF2 +zowe_setup_security_product=RACF + +# zowe_setup_security_groups_admin +# Label: Zowe admin user group +# Abstract: Zowe admin user group +# Category: security +# Description: +# Zowe admin user group +zowe_setup_security_groups_admin=ZWEADMIN + +# zowe_setup_security_groups_stc +# Label: Zowe STC group +# Abstract: Zowe STC group +# Category: security +# Description: +# Zowe STC group +zowe_setup_security_groups_stc=ZWEADMIN + +# zowe_setup_security_groups_sysProg +# Label: Zowe SysProg group +# Abstract: Zowe SysProg group +# Category: security +# Description: +# Zowe SysProg group +zowe_setup_security_groups_sysProg=ZWEADMIN + +# zowe_setup_security_users_zowe +# Label: Zowe runtime user +# Abstract: Zowe runtime user name of main service +# Category: security +# Description: +# Zowe runtime user name of main service +zowe_setup_security_users_zowe=ZWESVUSR + +# zowe_setup_security_users_zis +# Label: Zowe runtime user name of ZIS +# Abstract: Zowe runtime user name of ZIS +# Category: security +# Description: +# Zowe runtime user name of ZIS +zowe_setup_security_users_zis=ZWESIUSR + +# zowe_setup_security_stcs_zowe +# Label: STC name +# Abstract: STC name of main service +# Category: security +# Description: +# STC name of main service +zowe_setup_security_stcs_zowe=ZWESLSTC + +# zowe_setup_security_stcs_zis +# Label: STC name of ZIS +# Abstract: STC name of ZIS +# Category: security +# Description: +# STC name of ZIS +zowe_setup_security_stcs_zis=ZWESISTC + +# zowe_setup_security_stcs_aux +# Label: STC name of Auxiliary Service +# Abstract: STC name of Auxiliary Service +# Category: security +# Description: +# STC name of Auxiliary Service +zowe_setup_security_stcs_aux=ZWESASTC \ No newline at end of file diff --git a/workflows/files/ZWECONF.xml b/workflows/files/ZWECONF.xml index 87fae6c004..b1ee093592 100644 --- a/workflows/files/ZWECONF.xml +++ b/workflows/files/ZWECONF.xml @@ -99,39 +99,11 @@ IBMUSER.ZWEV2.CUST.ZWESAPL - - - Type of certificate storage. - Type of certificate storage. Valid values are: PKCS12, JCEKS, JCECCAKS, JCERACFKS, JCECCARACFKS, or JCEHYBRIDRACFKS - zowe - - - - PKCS12 - JCEKS - JCECCAKS - JCERACFKS - JCECCARACFKS - JCEHYBRIDRACFKS - PKCS12 - - - - - Keystore directory - Keystore directory - zowe - - - - /var/zowe/keystore - - VSAM data set with Record-Level-Sharing enabled or not VSAM data set with Record-Level-Sharing enabled or not - zowe + components @@ -144,7 +116,7 @@ Volume name if you are using VSAM in NONRLS mode Volume name if you are using VSAM in NONRLS mode - zowe + components @@ -154,7 +126,7 @@ Storage class name if you are using VSAM in RLS mode Storage class name if you are using VSAM in RLS mode - zowe + components @@ -296,7 +268,7 @@ some use cases, like containerization, this port could be different. - Zowe certificate keystore file + Zowe certificate keystore file. In case of keyring the format is "safkeyring://OWNER/KEYRING". Zowe certificate keystore file certificates @@ -328,18 +300,24 @@ some use cases, like containerization, this port could be different. - zowe_certificate_truststore_type - zowe_certificate_truststore_type + Zowe certificate truststore type + Zowe certificate truststore type certificates + PKCS12 + JCEKS + JCECCAKS + JCERACFKS + JCECCARACFKS + JCEHYBRIDRACFKS PKCS12 - File location for the certificate truststore + File location for the certificate truststore. Keyring is in the format "safkeyring://OWNER/KEYRING". File location for the certificate truststore certificates @@ -1058,6 +1036,117 @@ How we want to verify SSL certificates of services. Valid values are: 1 + + + Security product name. Can be RACF, ACF2 or TSS + Security product name. Can be RACF, ACF2 or TSS + security + + + + + RACF + TSS + ACF2 + RACF + + + + + Zowe admin user group + Zowe admin user group + security + + + + ZWEADMIN + + + + + + Zowe STC group + Zowe STC group + security + + + + + ZWEADMIN + + + + + Zowe SysProg group + Zowe SysProg group + security + + + + + ZWEADMIN + + + + + Zowe runtime user name of main service + Zowe runtime user name of main service + security + + + + + ZWESVUSR + + + + + Zowe runtime user name of ZIS + Zowe runtime user name of ZIS + security + + + + + ZWESIUSR + + + + + STC name of main service + STC name of main service + security + + + + + ZWESLSTC + + + + + STC name of ZIS + STC name of ZIS + security + + + + + ZWESISTC + + + + + STC name of Auxiliary Service + STC name of Auxiliary Service + security + + + + + ZWESASTC + + @@ -1078,8 +1167,6 @@ How we want to verify SSL certificates of services. Valid values are: - - @@ -1123,6 +1210,15 @@ How we want to verify SSL certificates of services. Valid values are: + + + + + + + + + Run this step to fill base variables. 1 z/OS System Programmer @@ -1259,7 +1355,7 @@ How we want to verify SSL certificates of services. Valid values are: false - + Chaching Service variables Specify the variables for the Caching Service @@ -1302,8 +1398,6 @@ How we want to verify SSL certificates of services. Valid values are: !${instance-components_caching_service_enabled} skipped - - Skipped if VSAM was not selected !(${instance-components_caching_service_storage_mode} == "VSAM") @@ -1336,8 +1430,6 @@ How we want to verify SSL certificates of services. Valid values are: !${instance-components_caching_service_enabled} skipped - - Skipped if infinispan was not selected !(${instance-components_caching_service_storage_mode} == "infinispan") @@ -1546,32 +1638,32 @@ echo ' # APF authorized LOADLIB for Zowe ZIS Plugins' >> "${instance-zowe_r echo ' authPluginLib: $!{instance-zowe_setup_dataset_authPluginLib}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # Security related configurations. This setup is optional.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # security:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # security product name. Can be RACF, ACF2 or TSS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # product: RACF' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # security group name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # groups:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # Zowe admin user group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # admin: ZWEADMIN' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # Zowe STC group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # stc: ZWEADMIN' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # Zowe SysProg group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # sysProg: ZWEADMIN' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # security user name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # users:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # Zowe runtime user name of main service' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # zowe: ZWESVUSR' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # Zowe runtime user name of ZIS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # zis: ZWESIUSR' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # STC names' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # stcs:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # STC name of Zowe main service' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # zowe: ZWESLSTC' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # STC name of Zowe ZIS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # zis: ZWESISTC' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # # STC name of Zowe ZIS Auxiliary Server' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' # aux: ZWESASTC' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # Security related configurations. This setup is optional.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' security:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # security product name. Can be RACF, ACF2 or TSS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' product: $!{instance-zowe_setup_security_product}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # security group name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' groups:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # Zowe admin user group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' admin: $!{instance-zowe_setup_security_groups_admin}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # Zowe STC group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' stc: $!{instance-zowe_setup_security_groups_stc}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # Zowe SysProg group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' sysProg: $!{instance-zowe_setup_security_groups_sysProg}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # security user name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' users:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # Zowe runtime user name of main service' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' zowe: $!{instance-zowe_setup_security_users_zowe}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # Zowe runtime user name of ZIS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' zis: $!{instance-zowe_setup_security_users_zis}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # STC names' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' stcs:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # STC name of Zowe main service' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' zowe: $!{instance-zowe_setup_security_stcs_zowe}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # STC name of Zowe ZIS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' zis: $!{instance-zowe_setup_security_stcs_zis}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # STC name of Zowe ZIS Auxiliary Server' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' aux: $!{instance-zowe_setup_security_stcs_aux}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo ' # Certificate related configurations' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" @@ -1580,13 +1672,13 @@ echo ' # There are 5 configurations cases. Please choose one from below.' >> echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo ' # >>>> Certificate setup scenario 1' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo ' # PKCS12 (keystore) with Zowe generate certificates.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' certificate:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # certificate:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo ' # Type of certificate storage. Valid values are: PKCS12, JCEKS, JCECCAKS, JCERACFKS, JCECCARACFKS, or JCEHYBRIDRACFKS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' type: $!{instance-zowe_setup_certificate_type}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' pkcs12:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # type: $!{instance-zowe_setup_certificate_type}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # pkcs12:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo ' # Keystore directory' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" -echo ' directory: $!{instance-zowe_setup_certificate_pkcs12_directory}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" +echo ' # directory: ' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo ' # # Lock the keystore directory to only accessible by Zowe runtime user and group.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo ' # lock: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" @@ -2340,7 +2432,7 @@ export NODE_HOME='${instance-node_home}' export PATH=$PATH:'${instance-zowe_runtimeDirectory}/bin' -zwe install -c '${instance-zowe_runtimeDirectory}/zowe.yaml' +zwe install -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite shell-JCL 1024 @@ -2353,9 +2445,15 @@ zwe install -c '${instance-zowe_runtimeDirectory}/zowe.yaml' zwe init -c ${instance-zowe_runtimeDirectory}/zowe.yml

- NOTE: The zwe init command is a combination of the following sub-commands.
- Each sub-command defines a configuration. + This step runs the commands:
+ zwe init mvs -c ${instance-zowe_runtimeDirectory}/zowe.yml --allow-overwrite
+ zwe init stc -c ${instance-zowe_runtimeDirectory}/zowe.yml --allow-overwrite
+#if (${instance-components_caching_service_storage_mode} == "VSAM" && ${instance-components_caching_service_enabled}) + zwe init vsam -c ${instance-zowe_runtimeDirectory}/zowe.yml --allow-overwrite
+#end +
+ NOTE: + Each zwe init sub-command defines a configuration.
  • mvs: Copy the data sets provided with Zowe to custom data sets.
  • security: Create the user IDs and security manager settings.
  • @@ -2378,15 +2476,56 @@ export NODE_HOME='${instance-node_home}' export PATH=$PATH:'${instance-zowe_runtimeDirectory}/bin' -zwe init -c mvs '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite -zwe init -c stc '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite +zwe init mvs -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite +zwe init stc -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite #if (${instance-components_caching_service_storage_mode} == "VSAM" && ${instance-components_caching_service_enabled}) -zwe init -c vsam '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite +zwe init vsam -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite #end shell-JCL 1024 + + Run the Zowe init security + Executes the Zowe initialization for security setup + + + + zwe init apfauth -c ${instance-zowe_runtimeDirectory}/zowe.yml
    + zwe init security -c ${instance-zowe_runtimeDirectory}/zowe.yml --allow-overwrite
    +
    + NOTE: + Each zwe init sub-command defines a configuration. +
      +
    • mvs: Copy the data sets provided with Zowe to custom data sets.
    • +
    • security: Create the user IDs and security manager settings.
    • +
    • apfauth: APF authorize the LOADLIB containing the modules that need to perform z/OS priviledged security calls.
    • +
    • certificate: Configure Zowe to use TLS certificates.
    • +
    • vsam: Configure the VSAM files needed to run the Zowe caching service used for high availability (HA).
    • +
    • stc: Configure the system to launch the Zowe started task.
    • +
    + ]]>
    + 1 + z/OS System Programmer + false + false + +