02.05.2013 Views

MKS Implementer 2006 Administration Guide

MKS Implementer 2006 Administration Guide

MKS Implementer 2006 Administration Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring <strong>MKS</strong> Integrity Server ACLs<br />

<strong>Implementer</strong> and <strong>MKS</strong> Integrity Integration<br />

<strong>Implementer</strong> requires an <strong>MKS</strong> Integrity user ID to proxy all commands sent to<br />

<strong>MKS</strong> Integrity. <strong>MKS</strong> recommends you create a new user ID, for example, iSeries, with a<br />

password that does not expire specifically for this purpose. This should be a user ID you<br />

normally do not log in with. Be sure to create the user ID on both your network and in<br />

<strong>MKS</strong> Integrity. This is also the user ID you define in <strong>Implementer</strong> as described on page 230.<br />

In <strong>MKS</strong> Integrity, this user ID requires:<br />

set up in its own unique group, for example, implementer developer group (the<br />

group should include only users who create and modify <strong>Implementer</strong> change packages)<br />

special privileges set up through the Impersonation ACL to perform work on behalf of<br />

the actual <strong>Implementer</strong> user for certain commands<br />

On the <strong>MKS</strong> Integrity Server, user access is controlled by permissions on ACLs through the<br />

Authorization <strong>Administration</strong> system. The <strong>MKS</strong> Integrity administrator typically performs<br />

ACL configuration. For details, see the <strong>MKS</strong> Integrity Server <strong>2006</strong> <strong>Administration</strong> <strong>Guide</strong>.<br />

NOTE The following task uses the <strong>MKS</strong> Integrity Web interface to configure ACLs;<br />

however, you can also use the <strong>MKS</strong> Integrity <strong>Administration</strong> Client. If using the<br />

client interface, modify the steps as needed.<br />

To configure the security ACLs for <strong>Implementer</strong> Server<br />

1 On the <strong>MKS</strong> Integrity Server, click Start <strong>MKS</strong> Authorization <strong>Administration</strong>.<br />

2 Add the following required ACL entries:<br />

mks:impersonate:group:<br />

principle: <br />

Impersonate allowed<br />

mks:im<br />

Admin allowed<br />

IMPORTANT In this example, implementer developer group is the <strong>MKS</strong> Integrity<br />

group that all <strong>Implementer</strong> users are a member of. Change this variable to reflect the<br />

group name you created. To avoid compromising your security, use a group other<br />

than the everyone group; by default, all users are part of this group.<br />

Customizing Permissions for the <strong>Implementer</strong> Change Package Type<br />

This is a required task that restricts users from the ability to modify user defined change<br />

packages outside of <strong>Implementer</strong>. This is necessary to ensure <strong>Implementer</strong> change packages<br />

remain synchronous between <strong>Implementer</strong> and <strong>MKS</strong> Integrity.<br />

205

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!