Granting required access to resources

Use this topic to determine what tasks to perform to apply security to the IBM MQ system on UNIX, Linux, Windows, IBM i, and z/OS .


During this task, you decide what actions are necessary to apply the appropriate level of security to the elements of the IBM MQ installation. Each individual task we are referred to gives step-by-step instructions for all platforms.


Procedure

  1. Do we need to limit access to your queue manager to certain users?
    1. No: Take no further action.
    2. Yes: Go to the next question.

  2. Do these users need partial administrative access on a subset of queue manager resources?
    1. No: Go to the next question.
    2. Yes: See Granting partial administrative access on a subset of queue manager resources.

  3. Do these users need full administrative access on a subset of queue manager resources?
    1. No: Go to the next question.
    2. Yes: See Granting full administrative access on a subset of queue manager resources.

  4. Do these users need read only access to all queue manager resources?
    1. No: Go to the next question.
    2. Yes: See Granting read-only access to all resources on a queue manager.

  5. Do these users need full administrative access on all queue manager resources?
    1. No: Go to the next question.
    2. Yes: See Granting full administrative access to all resources on a queue manager.

  6. Do we need user applications to connect to your queue manager?
    1. No: Disable connectivity, as described in Removing connectivity to the queue manager
    2. Yes: See Allowing user applications to connect to your queue manager.

Parent topic: Authorizing access to objects