As I speak to our automation customers, it's noticeable that more and more are moving to a self-service solution within their scheduling environments. Change management and incident management tools now have APIs, making it unnecessary to do many manual interactions and implementations. Moreover, privilege management tools allow much of the work associated with object creation to be shifted from the scheduling teams directly to application and development teams. It's more efficient to build the design of workload objects in the DevOps toolchain—and it's also less prone to human error. Releasing the scheduling teams from the mundane day-to-day allows them to concentrate on projects that add more value, and it empowers application and development teams and removes implementation bottlenecks.
The challenge
Maintaining site standards and consistency across our environments is a significant challenge as we distribute the responsibility to ever-larger teams. Most companies have mandatory rules or guidelines when implementing changes to their workload systems and objects. These rules are often more stringent in production than in user testing and may be stricter in user testing than in development.
When developers are excited about their new “bright shiny thing” and working to meet tight deadlines, these rules can be easily forgotten or overlooked. Then, some changes need to be made during the promotion to higher-level environments, forcing the changes back into a lower environment for retesting. This causes frustration for developers and it delays their projects, ultimately resulting in added costs for the business.
The mitigation
Runbooks, operating procedures, and guides are often written but seldom read. Moreover, maintaining and distributing content is laborious as environments become more complex and new use cases are established.
To help prevent this, some customers have gone to the length of writing their own “wrapper” scripts for the AutoSys JIL binary. These scripts require a host of standard and best practice checks before allowing changes to be implemented. This wrapper script approach is only a viable solution if all changes are implemented via the AutoSys CLI. However in today's environments, changes often are made via multiple interfaces, such as the AutoSys Web UI (WCC), iXp, CLI, and REST API. Therefore, this is only a partial solution to the enforcement of site standards.
The solution
Embedded Entitlements Manager (EEM) can be used to enforce job naming conventions, but cannot do everything that you may require. AutoSys Workload Automation also has a facility that can be used to check and verify further requirements. This feature is called the JIL Verification Exit (JVE). This is essentially additional code that is called via the application server. The JVE code is executed each time a change is made, regardless of where the change was initiated, including in the CLI, AutoSys Web UI, REST API, iXp, and so on.
Over the years, I have helped multiple customers adopt the JVE. In one case, we enabled a team to retire their wrapper script entirely. The JVE can be used to either modify a JIL attribute value or remove the attribute completely, with a meaningful message provided back to the user.
Here are some of the use cases I have seen:
- Enforcing naming standards
- Limiting the maximum value of attributes, such as n_retry
- Removing attributes that are not supported/used at the customer site, such as service_desk or permission
- Modifying attribute values to meet company standards, for example, owner
- Ensuring a minimum schedule cycle, such as enforcing a minimum five-minute gap between start_mins values
- Preventing unnecessary alarms, for example, to ensure that jobs do not have alarm_if_fail and n_retry enabled
- Preventing unscheduled jobs from being dependent upon themselves
Below is an example of JVE code reading in the specified start_mins attribute. The JVE rejects the change because there is less than a five-minute gap between '00' and '58'.

Below is an example of JVE code that standardizes the owner attribute during job creation in the AutoSys Web UI. Instead of rejecting the change and causing the user more work, the JVE amends the owner attribute to “owner@DOMAIN,” and notifies the user in the output.

In the final example, during job creation, the JVE parses the job name to maintain naming standards, and, via the AutoSys REST API, notifies the user that the change has been unsuccessful and why.

Conclusion
As we expand the number of people providing base scheduling rules, we must enforce site standards. However, we must do so in a way that minimizes disruption and effort.
The JVE makes the operational model more efficient, regardless of how schedule changes reach AutoSys. Use it to adjust soft deviations from the standards automatically and, in doing so, prevent the need for the user to edit and resubmit the change manually. Also, use the JVE to maintain your environment's integrity, rejecting hard deviations where necessary.
Watch this demonstration to help you start with the JVE and successfully adapt to the increase in workers who create and maintain scheduling rules.
Jonathan Hiett
Jon is a world-class Solution Architect with decades of experience in the Automation industry spanning the Financial and IT industries. In his role, Jon works with organizations to help define and implement strategies for the execution, management and observability of their workload automation solutions.
Other resources you might be interested in
Automic Automation Cloud Integrations: AWS Glue Automation Agent
Broadcom's AWS Glue Automation Agent lets you easily execute AWS Glue jobs, monitor and manage them with your existing enterprise workload automation, as well as other cloud-native activities.
AppNeta: Create Monitoring Policies for Active Monitoring
Learn how to create and configure monitoring policies in AppNeta in order to set up active network and web application monitoring.
Debunking the Myth of the Homogeneous Network
Tame multi-vendor network chaos by harnessing a single, scalable observability platform that unifies fault, performance, and configuration data.
DX NetOps: Network Observability Deployment Engine (NODE) Install
Learn how to establish the foundational architecture for the Network Observability Deployment Engine (NODE) by mastering the deployment of CaaS and LCM.
Mastering DX Netops Upgrade Automation
Learn how version 25.4.6 of the DX NetOps Upgrade Automation Tool provides new capabilities that make upgrades more resilient, transparent, and efficient.
Rally Office Hours: March 19, 2026
In this week's Rally Office hours, learn about Rally's new custom view revision history, color-coded tags, and AI-generated HTML widget tips.
The Safe Bridge to S/4HANA: Why Your AutoSys Strategy Remains Rock Solid
Don't replace your scheduler during your SAP S/4HANA migration. AutoSys is S/4HANA ready, so you can stick with the solution and streamline your migration
Rally Office Hours: March 12, 2026
Discover a new Rally course on Broadcom Software Academy featuring Custom Views and milestone dashboards, then learn about early adopter opportunities for MCP server OAuth authentication.
Why Your NOC Will Ignore AI
Network engineers often ignore AI warnings due to a lack of trust. Learn how network observability provides the evidence needed to validate predictive insights.