eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

supportconnectw.ca.com
from supportconnectw.ca.com More from this publisher
12.07.2015 Views

Controlling HFS Using the Native UNIX Security ModelWhen group access checks are performed, eTrust CA-Top Secret compares theGID of the file to the GID of the default group defined in DFLTGRP. If thesedon’t match, eTrust CA-Top Secret then compares the file's GID to the GIDs of allof the groups defined to the acid in the GROUP field. GIDs are added to theGROUP by issuing the following eTrust CA-Top Secret command:TSS ADD('acidname') GROUP('group name')If a match is found, eTrust CA-Top Secret uses group permissions to determinethe user's access to the file.Obtaining security information for a File within OpenEdition can be achieved byone of the following:■■■Use the OpenMVS ISPF ShellEnter the ls -l or ls -E shell commandRun a stat( ) or fstat( ) function in a programIn response, the system will display the TSO/E user ID and the eTrust CA-TopSecret group name that correspond to the file’s UID and GID permission bits.The system displays the UID and GID only if it cannot find the correspondingTSO/E user ID and eTrust CA-Top Secret group name. The informationreturned will include:■■■■Type of file or directoryOwner permission bitsGroup permission bitsOther permission bitsShell commands exist that change file/directory authorizations within the openedition arena. These shell commands include:CHMOD—Change permission bits for a file/directory.CHOWN—Change the owner or group for a file or directory.CHGRP—Change the group of a file.For more information about the Hierarchical File System and setting filepermissions, see these IBM documents: OS/390 OpenEdition User's Guide andOS/390 OpenEdition Planning.2–2 Cookbook

Controlling HFS Using the Native UNIX Security ModelProcesses that Affect HFS SecurityWhen using the UNIX security model, various options can affect the filevalidation process. The processes and their effect on file security or validationare described in this section.HFS FASTPATH CheckingAs of OS/390 V2R7, OMVS issues a SAF call at initialization. This SAF callchecks to see if access is authorized for OMVS to the FACILITY class resourceBPX.SAFFASTPATH. If access is allowed, OMVS performs permission bitchecking internally instead of calling the external security manager bypassingany audit trail of violations. This is referred to as FASTAUTH processing.Issue the following eTrust CA-Top Secret commands to eliminate this bypass:TSS ADDTO(anydept) IBMFAC(BPX.SAFF)TSS PERMIT(ALL) IBMFAC(BPX.SAFF) ACCESS(NONE)Also, do not give the STC acid associated with the OMVS started task theNORESCHK attribute.MOUNT NOSECURITYWith OS/390 V2R7, you now have the option to MOUNT a file system or part ofa file system with or without SECURITY. The use of the MOUNT commandrequires superuser authority. If the file system is mounted with theNOSECURITY option, USS makes access checks against system credentials (i.e.,superuser) rather that against user credentials. Access is allowed.Program Control in the UNIX EnvironmentWhen the BPX.DAEMON and BPX.SERVER facilities are active, processingauthorized functions, such as SETUID, requires that programs or executables beloaded from an authorized library. In a eTrust CA-Top Secret environment,these authorized data sets are any library in the LPA list, the APF list, orLINKLIST. If a program is loaded from the HFS or an MVS data set not on theapproved lists, the TCBNCTL flag, referred to as the “dirty bit,” is set. Thisresults in authorized functions failing if attempted in the “dirty” environment.When an executable or program is requested in an OMVS environment, OMVSfinds the executable in the HFS and loads from there unless the programcontrolled extended attribute, or “sticky bit,” is set. If this sticky bit is set on theexecutable file, OMVS uses normal MVS load processing. To avoid the dirty bitbeing set requires that the executables in the HFS have the sticky bit turned onusing the chmod command.Controlling Access to the Hierarchical File System 2–3

Controlling HFS Using the Native UNIX <strong>Security</strong> ModelWhen group access checks are per<strong>for</strong>med, <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> compares theGID of the file to the GID of the default group defined in DFLTGRP. If thesedon’t match, <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> then compares the file's GID to the GIDs of allof the groups defined to the acid in the GROUP field. GIDs are added to theGROUP by issuing the following <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> comm<strong>and</strong>:TSS ADD('acidname') GROUP('group name')If a match is found, <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> uses group permissions to determinethe user's access to the file.Obtaining security in<strong>for</strong>mation <strong>for</strong> a File within OpenEdition can be achieved byone of the following:■■■Use the OpenMVS ISPF ShellEnter the ls -l or ls -E shell comm<strong>and</strong>Run a stat( ) or fstat( ) function in a programIn response, the system will display the TSO/E user ID <strong>and</strong> the <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong><strong>Secret</strong> group name that correspond to the file’s UID <strong>and</strong> GID permission bits.The system displays the UID <strong>and</strong> GID only if it cannot find the correspondingTSO/E user ID <strong>and</strong> <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> group name. The in<strong>for</strong>mationreturned will include:■■■■Type of file or directoryOwner permission bitsGroup permission bitsOther permission bitsShell comm<strong>and</strong>s exist that change file/directory authorizations within the openedition arena. These shell comm<strong>and</strong>s include:CHMOD—Change permission bits <strong>for</strong> a file/directory.CHOWN—Change the owner or group <strong>for</strong> a file or directory.CHGRP—Change the group of a file.For more in<strong>for</strong>mation about the Hierarchical File System <strong>and</strong> setting filepermissions, see these IBM documents: <strong>OS</strong>/390 OpenEdition User's Guide <strong>and</strong><strong>OS</strong>/390 OpenEdition Planning.2–2 Cookbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!