eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

supportconnectw.ca.com
from supportconnectw.ca.com More from this publisher
12.07.2015 Views

HFSSEC Control OptionExample 1.1OPENMVS - xxxxxxxxTSS ADD(xxxxxxxx) HFSSEC(ROOT)TSS ADD(xxxxxxxx) IBMFAC(BPX.CAHF)TSS ADDTO(xxxxxxxx) HFSSEC(/bin)TSS ADDTO(xxxxxxxx) HFSSEC(/dev)TSS ADDTO(xxxxxxxx) HFSSEC(/etc)TSS ADDTO(xxxxxxxx) HFSSEC(/lib)TSS ADDTO(xxxxxxxx) HFSSEC(/opt)TSS ADDTO(xxxxxxxx) HFSSEC(/samples)TSS ADDTO(xxxxxxxx) HFSSEC(/tmp)TSS ADDTO(xxxxxxxx) HFSSEC(/u)TSS ADDTO(xxxxxxxx) HFSSEC(/usr)TSS ADDTO(xxxxxxxx) HFSSEC(/JavaS390)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.ATTRIBUTES)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.AUDIT.FLAGS)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.FORMAT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.GROUP)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE.EGID)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE.EUID)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE.STICKY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.OWNER)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.TIME)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.PRIORITY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CREATE.EXTERNAL.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CREATE.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CREATE.SYMBOLIC.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.MOUNT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.PTRACE)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.SET.PRIORITRY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.SET.RLIMIT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.UNMOUNT)TSS PERM(ALL) HFSSEC(ROOT) ACCESS(READ)ALL //binALL //devALL //etcALL //libALL //optStep 4—Run HFSPASS2. It will read the edited data set and produce a data setcontaining all the TSS commands to be executed. See example 2.2–24 Cookbook

HFSSEC Control OptionExample 2// JOB//STEP3 EXEC PGM=HFSUTIL2,REGION=0M//SYSABEND DD SYSOUT=*//SYSUDUMP DD SYSOUT=*//EXTRACT DD DSN=SORT.OUTPUT,DISP=SHR//PRMOUT DD DSN=TSS.CMDS,UNIT=3390,VOL=SER=SCAC16,// DISP=(NEW,CATLG,DELETE),SPACE=(TRK,(15,1),RLSE),// DCB=(RECFM=FB,LRECL=300,BLKSIZE=6000)Example 2.1 Output from the HFSUTIL2TSS ADD(xxxxxxxx) HFSSEC(ROOT)TSS ADD(xxxxxxxx) IBMFAC(BPX.CAHF)TSS ADDTO(xxxxxxxx) HFSSEC(/bin)TSS ADDTO(xxxxxxxx) HFSSEC(/dev)TSS ADDTO(xxxxxxxx) HFSSEC(/etc)TSS ADDTO(xxxxxxxx) HFSSEC(/lib)TSS ADDTO(xxxxxxxx) HFSSEC(/opt)TSS ADDTO(xxxxxxxx) HFSSEC(/samples)TSS ADDTO(xxxxxxxx) HFSSEC(/tmp)TSS ADDTO(xxxxxxxx) HFSSEC(/u)TSS ADDTO(xxxxxxxx) HFSSEC(/usr)TSS ADDTO(xxxxxxxx) HFSSEC(/JavaS390)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.ATTRIBUTES)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.AUDIT.FLAGS)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.FORMAT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.GROUP)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE.EGID)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE.EUID)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE.STICKY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.OWNER)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.TIME)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.PRIORITY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CREATE.EXTERNAL.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CREATE.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CREATE.SYMBOLIC.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.MOUNT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.PTRACE)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.SET.PRIORITRY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.SET.RLIMIT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.UNMOUNT)TSS PERM(ALL) HFSSEC(ROOT) ACCESS(READ)TSS PERMIT(ALL) HFSSEC(/bin) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/dev) ACCESS(EXEC)TSS PERMIT(ALL) HFSSEC(/etc) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/lib) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/opt) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/samples) ACCESS(READ,EXEC)Controlling Access to the Hierarchical File System 2–25

HFSSEC Control OptionExample 2// JOB//STEP3 EXEC PGM=HFSUTIL2,REGION=0M//SYSABEND DD SYSOUT=*//SYSUDUMP DD SYSOUT=*//EXTRACT DD DSN=SORT.OUTPUT,DISP=SHR//PRMOUT DD DSN=TSS.CMDS,UNIT=3390,VOL=SER=S<strong>CA</strong>C16,// DISP=(NEW,<strong>CA</strong>TLG,DELETE),SPACE=(TRK,(15,1),RLSE),// DCB=(RECFM=FB,LRECL=300,BLKSIZE=6000)Example 2.1 Output from the HFSUTIL2TSS ADD(xxxxxxxx) HFSSEC(ROOT)TSS ADD(xxxxxxxx) IBMFAC(BPX.<strong>CA</strong>HF)TSS ADDTO(xxxxxxxx) HFSSEC(/bin)TSS ADDTO(xxxxxxxx) HFSSEC(/dev)TSS ADDTO(xxxxxxxx) HFSSEC(/etc)TSS ADDTO(xxxxxxxx) HFSSEC(/lib)TSS ADDTO(xxxxxxxx) HFSSEC(/opt)TSS ADDTO(xxxxxxxx) HFSSEC(/samples)TSS ADDTO(xxxxxxxx) HFSSEC(/tmp)TSS ADDTO(xxxxxxxx) HFSSEC(/u)TSS ADDTO(xxxxxxxx) HFSSEC(/usr)TSS ADDTO(xxxxxxxx) HFSSEC(/JavaS390)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.ATTRIBUTES)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.AUDIT.FLAGS)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.FORMAT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.GROUP)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.MODE.EGID)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.MODE.EUID)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.MODE.STICKY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.MODE)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.OWNER)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.TIME)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.PRIORITY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CREATE.EXTERNAL.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CREATE.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CREATE.SYMBOLIC.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.MOUNT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.PTRACE)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.SET.PRIORITRY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.SET.RLIMIT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.UNMOUNT)TSS PERM(ALL) HFSSEC(ROOT) ACCESS(READ)TSS PERMIT(ALL) HFSSEC(/bin) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/dev) ACCESS(EXEC)TSS PERMIT(ALL) HFSSEC(/etc) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/lib) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/opt) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/samples) ACCESS(READ,EXEC)Controlling Access to the Hierarchical File System 2–25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!