eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect
eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect
HFSSEC Control OptionStep 5—Run REXX exec to execute the commands in the data set.Example 3/* REXX *//*This EXEC will have as input a dataset name and will readthat dataset and issue the TSS commands in it.*/arg dsn . /* get data set name */if dsn = '' then dsn = '????.?????.????''ALLOC FI(PERMIN) DS('''dsn''') SHR REUSE VOL(??????)'eof = 'no'do while eof = 'no''execio 1 diskr PERMIN'if rc = 2then doeof = 'yes'endelse dopull recordsay 'Record is: ' recordrecordendend'execio 1 diskr permin ( finis''FREE FI(PERMIN)'exit 02–26 Cookbook
MessagesMessagesCAS2301EEVENT PROCESSING ROUTINE COULD NOT BE LOADEDReason:The initialization process could not locate the event processing routine,SAFHFSEC.Action:Ensure that module SAFHFSEC is available in a link list library and that moduleSAFRTRLD contains the proper maintenance for CA SAF HFS security support.Module:SAFHFINTCAS2302EENF/USS GLOBAL WORKAREA NOT PRESENTReason:The ENF/USS initialization driver did not provide a required global workarea tothe security initialization routine.Action:Contact technical support.Module:SAFHFINTControlling Access to the Hierarchical File System 2–27
- Page 85 and 86: Certificate Name Filtering SupportI
- Page 87 and 88: Certificate Name Filtering SupportD
- Page 89 and 90: Certificate Name Filtering SupportL
- Page 91 and 92: KerberosKerberosetrust CA-Top Secre
- Page 93 and 94: KerberosThe command syntax for this
- Page 95 and 96: KerberosThe following command creat
- Page 97 and 98: Mapping of Foreign EnvironmentsMapp
- Page 99 and 100: Mapping of Foreign EnvironmentsMapp
- Page 101 and 102: Distributed File Server SMB SUPPORT
- Page 103 and 104: NFS (Network File System)The first
- Page 105 and 106: z/OS and OS/390 Security Server Sup
- Page 107 and 108: z/OS and OS/390 Security Server Sup
- Page 109 and 110: z/OS and OS/390 Security Server Sup
- Page 111 and 112: Chapter2Controlling Access to theHi
- Page 113 and 114: Controlling HFS Using the Native UN
- Page 115 and 116: Controlling HFS Using CA SAF HFS Se
- Page 117 and 118: Securing HFS FunctionsKeywordALLCON
- Page 119 and 120: Securing HFS FunctionsFile Function
- Page 121 and 122: Implementing CA SAF HFS SecurityImp
- Page 123 and 124: HFSSEC Control Option+12—The addr
- Page 125 and 126: HFSSEC Control OptionDiagnosticsThe
- Page 127 and 128: HFSSEC Control OptionUNIX CMDCHMOD(
- Page 129 and 130: HFSSEC Control OptionTSSSUTIL EQUIV
- Page 131 and 132: HFSSEC Control OptionUNIX CMDS ACCE
- Page 133 and 134: HFSSEC Control OptionExample 1// JO
- Page 135: HFSSEC Control OptionExample 2// JO
- Page 139 and 140: MessagesCAS2306Wxxxxxxxxxxxxxxx EVE
- Page 141: MessagesCAS2319ITRACEID=aaaaaaaa US
- Page 144 and 145: The SYSPLEX XES FunctionThere are t
- Page 146 and 147: eTrust CA-Top Secret and the SYSPLE
- Page 148 and 149: Defining the Sysplex to eTrust CA-T
- Page 150 and 151: Managing the Coupling FacilityWhen
- Page 152 and 153: Defining SYSTEM LOGGER to eTrust CA
- Page 154 and 155: IMVSECUR/*=========================
- Page 156 and 157: IMVSECUR/*=========================
- Page 158 and 159: IMVSECURFeature RACF eTrust CA-Top
- Page 160 and 161: PERMITIn eTrust CA-Top Secret, all
- Page 163 and 164: Indexcomponent names for z/OS and O
- Page 165 and 166: OpenEdition MVS supportACIDs needed
MessagesMessages<strong>CA</strong>S2301EEVENT PROCESSING ROUTINE COULD NOT BE LOADEDReason:The initialization process could not locate the event processing routine,SAFHFSEC.Action:Ensure that module SAFHFSEC is available in a link list library <strong>and</strong> that moduleSAFRTRLD contains the proper maintenance <strong>for</strong> <strong>CA</strong> SAF HFS security support.Module:SAFHFINT<strong>CA</strong>S2302EENF/USS GLOBAL WORKAREA NOT PRESENTReason:The ENF/USS initialization driver did not provide a required global workarea tothe security initialization routine.Action:Contact technical support.Module:SAFHFINTControlling Access to the Hierarchical File System 2–27