Chapter 7. Systems management 135
This scheme is meant to provide security, integrity, and flexibility to a large-scale
operating system environment, as explained here:
Security
The definition of the hardware is centralized. Only users that need to use it
must be authorized, and the activation action can be protected.
Integrity
Only LPARs that need to be able to share the same device are given access
to it. LPARs in the same production sysplex usually see the same devices in
order to be able to access the same data—but there may be other LPARs on
the same channel subsystem that must be allowed to see only their own
devices. This is the case of a testing or development system. There also may
be LPARS running different operating systems, for ...