diff --git a/workflows/files/ZWECONF.properties b/workflows/files/ZWECONF.properties
index 1e62abf35a..7ed87a211e 100644
--- a/workflows/files/ZWECONF.properties
+++ b/workflows/files/ZWECONF.properties
@@ -62,27 +62,10 @@ zowe_setup_dataset_authLoadlib=IBMUSER.ZWEV2.SZWEAUTH
# APF authorized LOADLIB for Zowe ZIS Plugins
zowe_setup_dataset_authPluginLib=IBMUSER.ZWEV2.CUST.ZWESAPL
-# zowe_setup_certificate_type
-# Label: Zowe setup certificate type
-# Abstract: Type of certificate storage.
-# Category: zowe
-# Description:
-# Type of certificate storage. Valid values are: PKCS12, JCEKS, JCECCAKS, JCERACFKS, JCECCARACFKS, or JCEHYBRIDRACFKS
-# Choices: PKCS12,JCEKS,JCECCAKS,JCERACFKS,JCECCARACFKS,JCEHYBRIDRACFKS
-zowe_setup_certificate_type=PKCS12
-
-# zowe_setup_certificate_pkcs12_directory
-# Label: Zowe setup certificate PKCS12 directory
-# Abstract: Keystore directory
-# Category: zowe
-# Description:
-# Keystore directory
-zowe_setup_certificate_pkcs12_directory=/var/zowe/keystore
-
# zowe_setup_vsam_mode
# Label: Zowe setup VSAM mode
# Abstract: VSAM data set with Record-Level-Sharing enabled or not
-# Category: zowe
+# Category: components
# Description:
# VSAM data set with Record-Level-Sharing enabled or not
# Choices: NONRLS,RLS
@@ -91,7 +74,7 @@ zowe_setup_vsam_mode=NONRLS
# zowe_setup_vsam_volume
# Label: Zowe setup VSAM volume
# Abstract: Volume name if you are using VSAM in NONRLS mode
-# Category: zowe
+# Category: components
# Description:
# Volume name if you are using VSAM in NONRLS mode
zowe_setup_vsam_volume=
@@ -99,7 +82,7 @@ zowe_setup_vsam_volume=
# zowe_setup_vsam_storageClass
# Label: Zowe setup VSAM storage class
# Abstract: Storage class name if you are using VSAM in RLS mode
-# Category: zowe
+# Category: components
# Description:
# Storage class name if you are using VSAM in RLS mode
zowe_setup_vsam_storageClass=
@@ -194,7 +177,7 @@ zowe_launchScript_CompConf=warn
# zowe_certificate_keystore_type
# Label: Zowe certificate keystore type
# Abstract: Certificate keystore type (PKCS12, JCEKS, JCECCAKS, JCERACFKS, JCECCARACFKS, or JCEHYBRIDRACFKS)
-# Category: zowe
+# Category: certificates
# Description:
# Certificate keystore type (PKCS12, JCEKS, JCECCAKS, JCERACFKS, JCECCARACFKS, or JCEHYBRIDRACFKS)
# Choices: PKCS12,JCEKS,JCECCAKS,JCERACFKS,JCECCARACFKS,JCEHYBRIDRACFKS
@@ -202,8 +185,8 @@ zowe_certificate_keystore_type=PKCS12
# zowe_certificate_keystore_file
# Label: Zowe certificate keystore file
-# Abstract: Zowe certificate keystore file
-# Category: zowe
+# Abstract: Zowe certificate keystore file. In case of keyring the format is "safkeyring://OWNER/KEYRING".
+# Category: certificates
# Description:
# Zowe certificate keystore file
zowe_certificate_keystore_file=/global/zowe/keystore/localhost/localhost.keystore.p12
@@ -211,7 +194,7 @@ zowe_certificate_keystore_file=/global/zowe/keystore/localhost/localhost.keystor
# zowe_certificate_keystore_password
# Label: Zowe certificate keystore password
# Abstract: Certificate keystore password.
-# Category: zowe
+# Category: certificates
# Description:
# Certificate keystore password.
zowe_certificate_keystore_password=password
@@ -219,23 +202,24 @@ zowe_certificate_keystore_password=password
# zowe_certificate_keystore_alias
# Label: Zowe certificate keystore alias
# Abstract: Alias for the certificate keystore
-# Category: zowe
+# Category: certificates
# Description:
# Alias for the certificate keystore
zowe_certificate_keystore_alias=localhost
# zowe_certificate_truststore_type
# Label: Zowe certificate truststore type
-# Abstract: zowe_certificate_truststore_type
-# Category: zowe
+# Abstract: Zowe certificate truststore type
+# Category: certificates
# Description:
-# zowe_certificate_truststore_type
+# Zowe certificate truststore type
+# Choices: PKCS12,JCEKS,JCECCAKS,JCERACFKS,JCECCARACFKS,JCEHYBRIDRACFKS
zowe_certificate_truststore_type=PKCS12
# zowe_certificate_truststore_file
# Label: Zowe certificate truststore file
-# Abstract: File location for the certificate truststore
-# Category: zowe
+# Abstract: File location for the certificate truststore. In case of keyring the format is "safkeyring://OWNER/KEYRING".
+# Category: certificates
# Description:
# File location for the certificate truststore
zowe_certificate_truststore_file=/global/zowe/keystore/localhost/localhost.truststore.p12
@@ -243,7 +227,7 @@ zowe_certificate_truststore_file=/global/zowe/keystore/localhost/localhost.trust
# zowe_certificate_truststore_password
# Label: Zowe certificate truststore password
# Abstract: Password for the certificate truststore
-# Category: zowe
+# Category: certificates
# Description:
# Password for the certificate truststore
zowe_certificate_truststore_password=password
@@ -251,7 +235,7 @@ zowe_certificate_truststore_password=password
# zowe_certificate_pem_key
# Label: Zowe certificate PEM key
# Abstract: Path to the Zowe certificate PEM key
-# Category: zowe
+# Category: certificates
# Description:
# Path to the Zowe certificate PEM key
zowe_certificate_pem_key=/global/zowe/keystore/localhost/localhost.key
@@ -259,7 +243,7 @@ zowe_certificate_pem_key=/global/zowe/keystore/localhost/localhost.key
# zowe_certificate_pem_certificate
# Label: Zowe certificate PEM certificate
# Abstract: Path to the PEM certificate
-# Category: zowe
+# Category: certificates
# Description:
# Path to the PEM certificate
zowe_certificate_pem_certificate=/global/zowe/keystore/localhost/localhost.cer
@@ -267,7 +251,7 @@ zowe_certificate_pem_certificate=/global/zowe/keystore/localhost/localhost.cer
# zowe_certificate_pem_certificateAuthorities
# Label: Zowe certificate PEM certificate authorities
# Abstract: zowe_certificate_pem_certificateAuthorities
-# Category: zowe
+# Category: certificates
# Description:
# zowe_certificate_pem_certificateAuthorities
zowe_certificate_pem_certificateAuthorities=/global/zowe/keystore/local_ca/local_ca.cer
@@ -275,7 +259,7 @@ zowe_certificate_pem_certificateAuthorities=/global/zowe/keystore/local_ca/local
# zowe_verifyCertificates
# Label: Zowe verify certificates
# Abstract: Zowe certificate verification
-# Category: zowe
+# Category: certificates
# Description:
# Zowe certificate verification
# Choices: STRICT,NONSTRICT,DISABLED
@@ -746,4 +730,77 @@ zowe_rbacProfileId=1
# Category: zowe
# Description:
# ID when determining for purposes such as to allow multiple copies of Zowe to be used within the same client
-zowe_cookieId=1
\ No newline at end of file
+zowe_cookieId=1
+
+# zowe_setup_security_product
+# Label: Security product name
+# Abstract: Security product name. Can be RACF, ACF2 or TSS
+# Category: security
+# Description:
+# Security product name. Can be RACF, ACF2 or TSS
+# Choices: RACF,TSS,ACF2
+zowe_setup_security_product=RACF
+
+# zowe_setup_security_groups_admin
+# Label: Zowe admin user group
+# Abstract: Zowe admin user group
+# Category: security
+# Description:
+# Zowe admin user group
+zowe_setup_security_groups_admin=ZWEADMIN
+
+# zowe_setup_security_groups_stc
+# Label: Zowe STC group
+# Abstract: Zowe STC group
+# Category: security
+# Description:
+# Zowe STC group
+zowe_setup_security_groups_stc=ZWEADMIN
+
+# zowe_setup_security_groups_sysProg
+# Label: Zowe SysProg group
+# Abstract: Zowe SysProg group
+# Category: security
+# Description:
+# Zowe SysProg group
+zowe_setup_security_groups_sysProg=ZWEADMIN
+
+# zowe_setup_security_users_zowe
+# Label: Zowe runtime user
+# Abstract: Zowe runtime user name of main service
+# Category: security
+# Description:
+# Zowe runtime user name of main service
+zowe_setup_security_users_zowe=ZWESVUSR
+
+# zowe_setup_security_users_zis
+# Label: Zowe runtime user name of ZIS
+# Abstract: Zowe runtime user name of ZIS
+# Category: security
+# Description:
+# Zowe runtime user name of ZIS
+zowe_setup_security_users_zis=ZWESIUSR
+
+# zowe_setup_security_stcs_zowe
+# Label: STC name
+# Abstract: STC name of main service
+# Category: security
+# Description:
+# STC name of main service
+zowe_setup_security_stcs_zowe=ZWESLSTC
+
+# zowe_setup_security_stcs_zis
+# Label: STC name of ZIS
+# Abstract: STC name of ZIS
+# Category: security
+# Description:
+# STC name of ZIS
+zowe_setup_security_stcs_zis=ZWESISTC
+
+# zowe_setup_security_stcs_aux
+# Label: STC name of Auxiliary Service
+# Abstract: STC name of Auxiliary Service
+# Category: security
+# Description:
+# STC name of Auxiliary Service
+zowe_setup_security_stcs_aux=ZWESASTC
\ No newline at end of file
diff --git a/workflows/files/ZWECONF.xml b/workflows/files/ZWECONF.xml
index 87fae6c004..b1ee093592 100644
--- a/workflows/files/ZWECONF.xml
+++ b/workflows/files/ZWECONF.xml
@@ -99,39 +99,11 @@
IBMUSER.ZWEV2.CUST.ZWESAPL
-
-
- Type of certificate storage.
- Type of certificate storage. Valid values are: PKCS12, JCEKS, JCECCAKS, JCERACFKS, JCECCARACFKS, or JCEHYBRIDRACFKS
- zowe
-
-
-
- PKCS12
- JCEKS
- JCECCAKS
- JCERACFKS
- JCECCARACFKS
- JCEHYBRIDRACFKS
- PKCS12
-
-
-
-
- Keystore directory
- Keystore directory
- zowe
-
-
-
- /var/zowe/keystore
-
-
VSAM data set with Record-Level-Sharing enabled or not
VSAM data set with Record-Level-Sharing enabled or not
- zowe
+ components
@@ -144,7 +116,7 @@
Volume name if you are using VSAM in NONRLS mode
Volume name if you are using VSAM in NONRLS mode
- zowe
+ components
@@ -154,7 +126,7 @@
Storage class name if you are using VSAM in RLS mode
Storage class name if you are using VSAM in RLS mode
- zowe
+ components
@@ -296,7 +268,7 @@ some use cases, like containerization, this port could be different.
- Zowe certificate keystore file
+ Zowe certificate keystore file. In case of keyring the format is "safkeyring://OWNER/KEYRING".
Zowe certificate keystore file
certificates
@@ -328,18 +300,24 @@ some use cases, like containerization, this port could be different.
- zowe_certificate_truststore_type
- zowe_certificate_truststore_type
+ Zowe certificate truststore type
+ Zowe certificate truststore type
certificates
+ PKCS12
+ JCEKS
+ JCECCAKS
+ JCERACFKS
+ JCECCARACFKS
+ JCEHYBRIDRACFKS
PKCS12
- File location for the certificate truststore
+ File location for the certificate truststore. Keyring is in the format "safkeyring://OWNER/KEYRING".
File location for the certificate truststore
certificates
@@ -1058,6 +1036,117 @@ How we want to verify SSL certificates of services. Valid values are:
1
+
+
+ Security product name. Can be RACF, ACF2 or TSS
+ Security product name. Can be RACF, ACF2 or TSS
+ security
+
+
+
+
+ RACF
+ TSS
+ ACF2
+ RACF
+
+
+
+
+ Zowe admin user group
+ Zowe admin user group
+ security
+
+
+
+ ZWEADMIN
+
+
+
+
+
+ Zowe STC group
+ Zowe STC group
+ security
+
+
+
+
+ ZWEADMIN
+
+
+
+
+ Zowe SysProg group
+ Zowe SysProg group
+ security
+
+
+
+
+ ZWEADMIN
+
+
+
+
+ Zowe runtime user name of main service
+ Zowe runtime user name of main service
+ security
+
+
+
+
+ ZWESVUSR
+
+
+
+
+ Zowe runtime user name of ZIS
+ Zowe runtime user name of ZIS
+ security
+
+
+
+
+ ZWESIUSR
+
+
+
+
+ STC name of main service
+ STC name of main service
+ security
+
+
+
+
+ ZWESLSTC
+
+
+
+
+ STC name of ZIS
+ STC name of ZIS
+ security
+
+
+
+
+ ZWESISTC
+
+
+
+
+ STC name of Auxiliary Service
+ STC name of Auxiliary Service
+ security
+
+
+
+
+ ZWESASTC
+
+
@@ -1078,8 +1167,6 @@ How we want to verify SSL certificates of services. Valid values are:
-
-
@@ -1123,6 +1210,15 @@ How we want to verify SSL certificates of services. Valid values are:
+
+
+
+
+
+
+
+
+
Run this step to fill base variables.
1
z/OS System Programmer
@@ -1259,7 +1355,7 @@ How we want to verify SSL certificates of services. Valid values are:
false
-
+
Chaching Service variables
Specify the variables for the Caching Service
@@ -1302,8 +1398,6 @@ How we want to verify SSL certificates of services. Valid values are:
!${instance-components_caching_service_enabled}
skipped
-
-
Skipped if VSAM was not selected
!(${instance-components_caching_service_storage_mode} == "VSAM")
@@ -1336,8 +1430,6 @@ How we want to verify SSL certificates of services. Valid values are:
!${instance-components_caching_service_enabled}
skipped
-
-
Skipped if infinispan was not selected
!(${instance-components_caching_service_storage_mode} == "infinispan")
@@ -1546,32 +1638,32 @@ echo ' # APF authorized LOADLIB for Zowe ZIS Plugins' >> "${instance-zowe_r
echo ' authPluginLib: $!{instance-zowe_setup_dataset_authPluginLib}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # Security related configurations. This setup is optional.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # security:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # security product name. Can be RACF, ACF2 or TSS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # product: RACF' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # security group name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # groups:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # Zowe admin user group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # admin: ZWEADMIN' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # Zowe STC group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # stc: ZWEADMIN' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # Zowe SysProg group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # sysProg: ZWEADMIN' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # security user name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # users:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # Zowe runtime user name of main service' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # zowe: ZWESVUSR' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # Zowe runtime user name of ZIS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # zis: ZWESIUSR' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # STC names' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # stcs:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # STC name of Zowe main service' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # zowe: ZWESLSTC' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # STC name of Zowe ZIS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # zis: ZWESISTC' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # # STC name of Zowe ZIS Auxiliary Server' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # aux: ZWESASTC' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Security related configurations. This setup is optional.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' security:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # security product name. Can be RACF, ACF2 or TSS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' product: $!{instance-zowe_setup_security_product}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # security group name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' groups:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe admin user group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' admin: $!{instance-zowe_setup_security_groups_admin}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe STC group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' stc: $!{instance-zowe_setup_security_groups_stc}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe SysProg group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' sysProg: $!{instance-zowe_setup_security_groups_sysProg}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # security user name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' users:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe runtime user name of main service' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' zowe: $!{instance-zowe_setup_security_users_zowe}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe runtime user name of ZIS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' zis: $!{instance-zowe_setup_security_users_zis}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # STC names' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' stcs:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # STC name of Zowe main service' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' zowe: $!{instance-zowe_setup_security_stcs_zowe}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # STC name of Zowe ZIS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' zis: $!{instance-zowe_setup_security_stcs_zis}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # STC name of Zowe ZIS Auxiliary Server' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' aux: $!{instance-zowe_setup_security_stcs_aux}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # Certificate related configurations' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
@@ -1580,13 +1672,13 @@ echo ' # There are 5 configurations cases. Please choose one from below.' >>
echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # >>>> Certificate setup scenario 1' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # PKCS12 (keystore) with Zowe generate certificates.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' certificate:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # certificate:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # Type of certificate storage. Valid values are: PKCS12, JCEKS, JCECCAKS, JCERACFKS, JCECCARACFKS, or JCEHYBRIDRACFKS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' type: $!{instance-zowe_setup_certificate_type}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' pkcs12:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # type: $!{instance-zowe_setup_certificate_type}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # pkcs12:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # Keystore directory' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' directory: $!{instance-zowe_setup_certificate_pkcs12_directory}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # directory: ' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # # Lock the keystore directory to only accessible by Zowe runtime user and group.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # lock: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
@@ -2340,7 +2432,7 @@ export NODE_HOME='${instance-node_home}'
export PATH=$PATH:'${instance-zowe_runtimeDirectory}/bin'
-zwe install -c '${instance-zowe_runtimeDirectory}/zowe.yaml'
+zwe install -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite
shell-JCL
1024
@@ -2353,9 +2445,15 @@ zwe install -c '${instance-zowe_runtimeDirectory}/zowe.yaml'
zwe init -c ${instance-zowe_runtimeDirectory}/zowe.yml
- NOTE: The zwe init command is a combination of the following sub-commands.
- Each sub-command defines a configuration.
+ This step runs the commands:
+ zwe init mvs -c ${instance-zowe_runtimeDirectory}/zowe.yml --allow-overwrite
+ zwe init stc -c ${instance-zowe_runtimeDirectory}/zowe.yml --allow-overwrite
+#if (${instance-components_caching_service_storage_mode} == "VSAM" && ${instance-components_caching_service_enabled})
+ zwe init vsam -c ${instance-zowe_runtimeDirectory}/zowe.yml --allow-overwrite
+#end
+
+ NOTE:
+ Each zwe init sub-command defines a configuration.
- mvs: Copy the data sets provided with Zowe to custom data sets.
- security: Create the user IDs and security manager settings.
@@ -2378,15 +2476,56 @@ export NODE_HOME='${instance-node_home}'
export PATH=$PATH:'${instance-zowe_runtimeDirectory}/bin'
-zwe init -c mvs '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite
-zwe init -c stc '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite
+zwe init mvs -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite
+zwe init stc -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite
#if (${instance-components_caching_service_storage_mode} == "VSAM" && ${instance-components_caching_service_enabled})
-zwe init -c vsam '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite
+zwe init vsam -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite
#end
shell-JCL
1024
+
+ Run the Zowe init security
+ Executes the Zowe initialization for security setup
+
+
+
+ zwe init apfauth -c ${instance-zowe_runtimeDirectory}/zowe.yml
+ zwe init security -c ${instance-zowe_runtimeDirectory}/zowe.yml --allow-overwrite
+
+ NOTE:
+ Each zwe init sub-command defines a configuration.
+
+- mvs: Copy the data sets provided with Zowe to custom data sets.
+- security: Create the user IDs and security manager settings.
+- apfauth: APF authorize the LOADLIB containing the modules that need to perform z/OS priviledged security calls.
+- certificate: Configure Zowe to use TLS certificates.
+- vsam: Configure the VSAM files needed to run the Zowe caching service used for high availability (HA).
+- stc: Configure the system to launch the Zowe started task.
+
+ ]]>
+ 1
+ z/OS System Programmer
+ false
+ false
+
+ set -e
+set -x
+
+export JAVA_HOME='${instance-java_home}'
+export NODE_HOME='${instance-node_home}'
+
+export PATH=$PATH:'${instance-zowe_runtimeDirectory}/bin'
+
+zwe init security -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite
+zwe init apfauth -c '${instance-zowe_runtimeDirectory}/zowe.yaml'
+ shell-JCL
+ 1024
+
+
+