eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

supportconnectw.ca.com
from supportconnectw.ca.com More from this publisher
12.07.2015 Views

Controlling HFS Using CA SAF HFS SecurityHFSSEC Resource ClassCA SAF HFS security introduces a new pre-defined resource class calledHFSSEC. This new RESCLASS is used when defining file and directory levelaccess in eTrust CA-Top Secret.Permission ConsiderationsThis section describes special considerations to be taken into account whenadministering permits for HFS resources.In addition to access to HFS files, users can also need access to directories. Auser requires READ access to a directory in order to list the contents of thatdirectory. When writing a permission, you distinguish a directory permit from afile permit by not using a trailing period in the HFSSEC authorization. Forexample, the permits used to allow users to read the /BIN directory, but onlyallow EXECUTE access to the files contained within the directory is:TSS PER(ALL) HFSSEC(/BIN) ACCESS(READ)TSS PER(ALL) HFSSEC(/BIN.) ACCESS(EXEC)The root directory is defined by the single character (/). With eTrust CA-TopSecret the root directory must be owned using the special name ROOT. Filescontained in the root directory (/) must be specified as the slash (/) followed bythe file name. Therefore, the only valid permit for the ROOT directory (/) is thatwhich allows read access to the directory itself. The following shows the permitrequired for the root directory and a permit that allows read and write access tofile rootfile:TSS PER(ALL) HFSSEC(ROOT) ACCESS(READ)TSS PER(ALL) HFSSEC(/ROOTFILE) ACCESS(UPDATE)Permits administered to secure HFS file resources should specify the ACCESSkeyword to identify the type of access to the file. If the access keyword is notused, READ access is implied. The access keywords and their meanings follow:KeywordEXECUTEREADUPDATEALTERDescriptionAllows execute access to a file, usually a program file.Allows read access to a file.Allows write access to a file.Allows create and delete access to a file.2–6 Cookbook

Securing HFS FunctionsKeywordALLCONTROLDescriptionAllows all of the above.A special access not used for normal file accessvalidation. This is used with HFS function security toallow a user to change file attributes. Moreinformation can be found in the following section.ReportingAudit records created by HFS file access checks, (i.e., violations, and auditevents) are written to the Audit Tracking File and accessed by the TSSUTILreport utility. TSSUTIL integrates these events among other events according tothe report generation criteria.Securing HFS FunctionsIn addition to file access security, HFS functions can also be secured. Thesefunctions can be a system action, such as setting a ptrace or a job’s priority, orthey can be file-related, such as changing the file mode or audit settings.A system function is secured by a rule in the IBMFAC class, while a file-relatedfunction is secured by a combination of an IBMFAC class rule and a HFS fileresource rule. By following this approach, changes to file attributes can bepermitted at a global basis, or restricted to a particular file.The resource name format for HFS IBMFAC rules is: BPX.CAHFS.function. Anexample of a permission would be:TSS PER(USER01) IBMFAC(BPX.CAHFS.function) ACCESS(READ)System FunctionsIn order to perform a system function, the user requires READ access to thecorresponding IBMFAC.Controlling Access to the Hierarchical File System 2–7

Controlling HFS Using <strong>CA</strong> SAF HFS <strong>Security</strong>HFSSEC Resource Class<strong>CA</strong> SAF HFS security introduces a new pre-defined resource class calledHFSSEC. This new RESCLASS is used when defining file <strong>and</strong> directory levelaccess in <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong>.Permission ConsiderationsThis section describes special considerations to be taken into account whenadministering permits <strong>for</strong> HFS resources.In addition to access to HFS files, users can also need access to directories. Auser requires READ access to a directory in order to list the contents of thatdirectory. When writing a permission, you distinguish a directory permit from afile permit by not using a trailing period in the HFSSEC authorization. Forexample, the permits used to allow users to read the /BIN directory, but onlyallow EXECUTE access to the files contained within the directory is:TSS PER(ALL) HFSSEC(/BIN) ACCESS(READ)TSS PER(ALL) HFSSEC(/BIN.) ACCESS(EXEC)The root directory is defined by the single character (/). With <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong><strong>Secret</strong> the root directory must be owned using the special name ROOT. Filescontained in the root directory (/) must be specified as the slash (/) followed bythe file name. There<strong>for</strong>e, the only valid permit <strong>for</strong> the ROOT directory (/) is thatwhich allows read access to the directory itself. The following shows the permitrequired <strong>for</strong> the root directory <strong>and</strong> a permit that allows read <strong>and</strong> write access tofile rootfile:TSS PER(ALL) HFSSEC(ROOT) ACCESS(READ)TSS PER(ALL) HFSSEC(/ROOTFILE) ACCESS(UPDATE)Permits administered to secure HFS file resources should specify the ACCESSkeyword to identify the type of access to the file. If the access keyword is notused, READ access is implied. The access keywords <strong>and</strong> their meanings follow:KeywordEXECUTEREADUPDATEALTERDescriptionAllows execute access to a file, usually a program file.Allows read access to a file.Allows write access to a file.Allows create <strong>and</strong> delete access to a file.2–6 Cookbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!