eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect
eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect
HFSSEC Control OptionExample 1.1OPENMVS - xxxxxxxxTSS ADD(xxxxxxxx) HFSSEC(ROOT)TSS ADD(xxxxxxxx) IBMFAC(BPX.CAHF)TSS ADDTO(xxxxxxxx) HFSSEC(/bin)TSS ADDTO(xxxxxxxx) HFSSEC(/dev)TSS ADDTO(xxxxxxxx) HFSSEC(/etc)TSS ADDTO(xxxxxxxx) HFSSEC(/lib)TSS ADDTO(xxxxxxxx) HFSSEC(/opt)TSS ADDTO(xxxxxxxx) HFSSEC(/samples)TSS ADDTO(xxxxxxxx) HFSSEC(/tmp)TSS ADDTO(xxxxxxxx) HFSSEC(/u)TSS ADDTO(xxxxxxxx) HFSSEC(/usr)TSS ADDTO(xxxxxxxx) HFSSEC(/JavaS390)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.ATTRIBUTES)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.AUDIT.FLAGS)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.FORMAT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.GROUP)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE.EGID)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE.EUID)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE.STICKY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.OWNER)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.TIME)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.PRIORITY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CREATE.EXTERNAL.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CREATE.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CREATE.SYMBOLIC.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.MOUNT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.PTRACE)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.SET.PRIORITRY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.SET.RLIMIT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.UNMOUNT)TSS PERM(ALL) HFSSEC(ROOT) ACCESS(READ)ALL //binALL //devALL //etcALL //libALL //optStep 4—Run HFSPASS2. It will read the edited data set and produce a data setcontaining all the TSS commands to be executed. See example 2.2–24 Cookbook
HFSSEC Control OptionExample 2// JOB//STEP3 EXEC PGM=HFSUTIL2,REGION=0M//SYSABEND DD SYSOUT=*//SYSUDUMP DD SYSOUT=*//EXTRACT DD DSN=SORT.OUTPUT,DISP=SHR//PRMOUT DD DSN=TSS.CMDS,UNIT=3390,VOL=SER=SCAC16,// DISP=(NEW,CATLG,DELETE),SPACE=(TRK,(15,1),RLSE),// DCB=(RECFM=FB,LRECL=300,BLKSIZE=6000)Example 2.1 Output from the HFSUTIL2TSS ADD(xxxxxxxx) HFSSEC(ROOT)TSS ADD(xxxxxxxx) IBMFAC(BPX.CAHF)TSS ADDTO(xxxxxxxx) HFSSEC(/bin)TSS ADDTO(xxxxxxxx) HFSSEC(/dev)TSS ADDTO(xxxxxxxx) HFSSEC(/etc)TSS ADDTO(xxxxxxxx) HFSSEC(/lib)TSS ADDTO(xxxxxxxx) HFSSEC(/opt)TSS ADDTO(xxxxxxxx) HFSSEC(/samples)TSS ADDTO(xxxxxxxx) HFSSEC(/tmp)TSS ADDTO(xxxxxxxx) HFSSEC(/u)TSS ADDTO(xxxxxxxx) HFSSEC(/usr)TSS ADDTO(xxxxxxxx) HFSSEC(/JavaS390)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.ATTRIBUTES)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.AUDIT.FLAGS)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.FORMAT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.GROUP)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE.EGID)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE.EUID)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE.STICKY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.MODE)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.OWNER)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.FILE.TIME)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CHANGE.PRIORITY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CREATE.EXTERNAL.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CREATE.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.CREATE.SYMBOLIC.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.MOUNT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.PTRACE)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.SET.PRIORITRY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.SET.RLIMIT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.CAHFS.UNMOUNT)TSS PERM(ALL) HFSSEC(ROOT) ACCESS(READ)TSS PERMIT(ALL) HFSSEC(/bin) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/dev) ACCESS(EXEC)TSS PERMIT(ALL) HFSSEC(/etc) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/lib) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/opt) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/samples) ACCESS(READ,EXEC)Controlling Access to the Hierarchical File System 2–25
- Page 83 and 84: Certificate Name Filtering SupportT
- Page 85 and 86: Certificate Name Filtering SupportI
- Page 87 and 88: Certificate Name Filtering SupportD
- Page 89 and 90: Certificate Name Filtering SupportL
- Page 91 and 92: KerberosKerberosetrust CA-Top Secre
- Page 93 and 94: KerberosThe command syntax for this
- Page 95 and 96: KerberosThe following command creat
- Page 97 and 98: Mapping of Foreign EnvironmentsMapp
- Page 99 and 100: Mapping of Foreign EnvironmentsMapp
- Page 101 and 102: Distributed File Server SMB SUPPORT
- Page 103 and 104: NFS (Network File System)The first
- Page 105 and 106: z/OS and OS/390 Security Server Sup
- Page 107 and 108: z/OS and OS/390 Security Server Sup
- Page 109 and 110: z/OS and OS/390 Security Server Sup
- Page 111 and 112: Chapter2Controlling Access to theHi
- Page 113 and 114: Controlling HFS Using the Native UN
- Page 115 and 116: Controlling HFS Using CA SAF HFS Se
- Page 117 and 118: Securing HFS FunctionsKeywordALLCON
- Page 119 and 120: Securing HFS FunctionsFile Function
- Page 121 and 122: Implementing CA SAF HFS SecurityImp
- Page 123 and 124: HFSSEC Control Option+12—The addr
- Page 125 and 126: HFSSEC Control OptionDiagnosticsThe
- Page 127 and 128: HFSSEC Control OptionUNIX CMDCHMOD(
- Page 129 and 130: HFSSEC Control OptionTSSSUTIL EQUIV
- Page 131 and 132: HFSSEC Control OptionUNIX CMDS ACCE
- Page 133: HFSSEC Control OptionExample 1// JO
- Page 137 and 138: MessagesMessagesCAS2301EEVENT PROCE
- Page 139 and 140: MessagesCAS2306Wxxxxxxxxxxxxxxx EVE
- Page 141: MessagesCAS2319ITRACEID=aaaaaaaa US
- Page 144 and 145: The SYSPLEX XES FunctionThere are t
- Page 146 and 147: eTrust CA-Top Secret and the SYSPLE
- Page 148 and 149: Defining the Sysplex to eTrust CA-T
- Page 150 and 151: Managing the Coupling FacilityWhen
- Page 152 and 153: Defining SYSTEM LOGGER to eTrust CA
- Page 154 and 155: IMVSECUR/*=========================
- Page 156 and 157: IMVSECUR/*=========================
- Page 158 and 159: IMVSECURFeature RACF eTrust CA-Top
- Page 160 and 161: PERMITIn eTrust CA-Top Secret, all
- Page 163 and 164: Indexcomponent names for z/OS and O
- Page 165 and 166: OpenEdition MVS supportACIDs needed
HFSSEC Control OptionExample 2// JOB//STEP3 EXEC PGM=HFSUTIL2,REGION=0M//SYSABEND DD SYSOUT=*//SYSUDUMP DD SYSOUT=*//EXTRACT DD DSN=SORT.OUTPUT,DISP=SHR//PRMOUT DD DSN=TSS.CMDS,UNIT=3390,VOL=SER=S<strong>CA</strong>C16,// DISP=(NEW,<strong>CA</strong>TLG,DELETE),SPACE=(TRK,(15,1),RLSE),// DCB=(RECFM=FB,LRECL=300,BLKSIZE=6000)Example 2.1 Output from the HFSUTIL2TSS ADD(xxxxxxxx) HFSSEC(ROOT)TSS ADD(xxxxxxxx) IBMFAC(BPX.<strong>CA</strong>HF)TSS ADDTO(xxxxxxxx) HFSSEC(/bin)TSS ADDTO(xxxxxxxx) HFSSEC(/dev)TSS ADDTO(xxxxxxxx) HFSSEC(/etc)TSS ADDTO(xxxxxxxx) HFSSEC(/lib)TSS ADDTO(xxxxxxxx) HFSSEC(/opt)TSS ADDTO(xxxxxxxx) HFSSEC(/samples)TSS ADDTO(xxxxxxxx) HFSSEC(/tmp)TSS ADDTO(xxxxxxxx) HFSSEC(/u)TSS ADDTO(xxxxxxxx) HFSSEC(/usr)TSS ADDTO(xxxxxxxx) HFSSEC(/JavaS390)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.ATTRIBUTES)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.AUDIT.FLAGS)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.FORMAT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.GROUP)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.MODE.EGID)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.MODE.EUID)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.MODE.STICKY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.MODE)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.OWNER)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.FILE.TIME)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CHANGE.PRIORITY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CREATE.EXTERNAL.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CREATE.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.CREATE.SYMBOLIC.LINK)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.MOUNT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.PTRACE)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.SET.PRIORITRY)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.SET.RLIMIT)TSS PERM(ALL) FOR(14) IBMFAC(BPX.<strong>CA</strong>HFS.UNMOUNT)TSS PERM(ALL) HFSSEC(ROOT) ACCESS(READ)TSS PERMIT(ALL) HFSSEC(/bin) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/dev) ACCESS(EXEC)TSS PERMIT(ALL) HFSSEC(/etc) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/lib) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/opt) ACCESS(READ,EXEC)TSS PERMIT(ALL) HFSSEC(/samples) ACCESS(READ,EXEC)Controlling Access to the Hierarchical File System 2–25