eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect
eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect
IMVSECUR/*=====================================================================*//* OS/390 Firewall setup. *//*=====================================================================*/TSS CRE(FWGRP) TYPE(GROUP) NAME('FIREWALL GROUP') DEPT(anydept)TSS ADD(FWGRP) GID(nn) any unused GID number is allowed/* */TSS CRE(FWKERN) TYPE(USER) NAME('FIREWALL STARTUP ID') -DEPT(anydept) FAC(STC,BATCH) PASS(password,0)TSS ADD(FWKERN) GROUP(FWGRP) DFLTGRP(FWGRP) -HOME(/usr/lpp/fw/home/fwkern/) OMVSPGM(/bin/sh) UID(0)TSS ADD(STC) PROCNAME(FWKERN) ACID(FWKERN)SS MODIFY(OMVSTABS)/* */TSS ADD(STC) PROCNAME(ICAPSLOG) ACID(FWKERN)TSS ADD(STC) PROCNAME(ICAPSOCK) ACID(FWKERN)TSS ADD(STC) PROCNAME(ICAPPFTP) ACID(FWKERN)TSS ADD(STC) PROCNAME(ICAPTNAT) ACID(FWKERN)/*TSS ADDTO(anydept) DSN(TCPIP.)TSS PERMIT(FWKERN) DSN(TCPIP.) ACCESS(READ)/* */TSS PERMIT(FWKERN) IBMFAC(BPX.SMF) ACCESS(READ)/* *//* To give administrators access to FWGRP *//* */TSS ADDTO(acid) GROUP(FWGRP)/* *//* *//* Define and give ICFS services */TSS ADDTO(anydept) CSFSERV(service-name)TSS PERMIT(acid) CSFSERV(service-name) ACCESS(READ)/* *//*======================================================================*//* LDAP setup. *//*=====================================================================*/TSS CRE(LDAPGRP) TYPE(GROUP) NAME('LDAP GROUP') DEPT(anydept)TSS ADD(LDAPGRP) GID(nn) any unused GID number is allowed/* */TSS CRE(LDAPSRV) TYPE(USER) NAME('LDAP STARTUP ID') -DEPT(anydept) FAC(STC,BATCH) PASS(password,0)TSS ADD(LDAPSRV) GROUP(LDAPGRP) DFLTGRP(LDAPGRP) -HOME(/) OMVSPGM(/bin/sh) UID(0)TSS ADD(STC) PROCNAME(LDAPSRV) ACID(LDAPSRV)TSS MODIFY(OMVSTABS)/* */TSS PERMIT(LDAPSRV) IBMFAC(BPX.DAEMON) ACCESS(READ)TSS PERMIT(LDAPSRV) IBMFAC(BPX.SERVER) ACCESS(UPDATE)/* *//* To give administrators access to LDAPGRP */TSS ADDTO(acid) GROUP(LDAPGRP)/*A–4 Cookbook
AppendixBRACF to eTrust CA-Top SecretTranslationMany applications and products describe the setup for external security in RACFterms. The purpose of this Appendix is to describe what the RACF terminologymeans so a eTrust CA-Top Secret administrator can take the information andcreate the necessary eTrust CA-Top Secret records to implement it.Use the following chart to check the corresponding eTrust CA-Top Secret feature.Feature RACF eTrust CA-Top SecretUsers/GroupsResourceProtectionSPECIAL GroupconceptData SetsDASD volumesTape volumesTerminalsLoad modules(programs)IMS applicationgroup names(AIMS)IMS transactions(TIMS and GIMS)IMS applicationsCICS PSBsCICS transactionsCICS filesCICS journalsCICS programsMSCA, LSCAs, Zones, Divisions,Departments, Profiles, ACIDsData Sets (DSN)DASD volumes (VOL)Tape volumes (VOL)Terminals (TERM, SOURCE)Programs (PROG)IMS applications (APPL)Transactions via Limited Command Facility(LCF) or protected resources (OTRAN)Facility checkingCICS PSBsTransactions via Limited Command Facility(LCF) or protected resources (OTRAN)CICS files (FCT)CICS journals (JCT)CICS programs (PPT)RACF to eTrust CA-Top Secret Translation B–1
- Page 105 and 106: z/OS and OS/390 Security Server Sup
- Page 107 and 108: z/OS and OS/390 Security Server Sup
- Page 109 and 110: z/OS and OS/390 Security Server Sup
- Page 111 and 112: Chapter2Controlling Access to theHi
- Page 113 and 114: Controlling HFS Using the Native UN
- Page 115 and 116: Controlling HFS Using CA SAF HFS Se
- Page 117 and 118: Securing HFS FunctionsKeywordALLCON
- Page 119 and 120: Securing HFS FunctionsFile Function
- Page 121 and 122: Implementing CA SAF HFS SecurityImp
- Page 123 and 124: HFSSEC Control Option+12—The addr
- Page 125 and 126: HFSSEC Control OptionDiagnosticsThe
- Page 127 and 128: HFSSEC Control OptionUNIX CMDCHMOD(
- Page 129 and 130: HFSSEC Control OptionTSSSUTIL EQUIV
- Page 131 and 132: HFSSEC Control OptionUNIX CMDS ACCE
- Page 133 and 134: HFSSEC Control OptionExample 1// JO
- Page 135 and 136: HFSSEC Control OptionExample 2// JO
- Page 137 and 138: MessagesMessagesCAS2301EEVENT PROCE
- Page 139 and 140: MessagesCAS2306Wxxxxxxxxxxxxxxx EVE
- Page 141: MessagesCAS2319ITRACEID=aaaaaaaa US
- Page 144 and 145: The SYSPLEX XES FunctionThere are t
- Page 146 and 147: eTrust CA-Top Secret and the SYSPLE
- Page 148 and 149: Defining the Sysplex to eTrust CA-T
- Page 150 and 151: Managing the Coupling FacilityWhen
- Page 152 and 153: Defining SYSTEM LOGGER to eTrust CA
- Page 154 and 155: IMVSECUR/*=========================
- Page 158 and 159: IMVSECURFeature RACF eTrust CA-Top
- Page 160 and 161: PERMITIn eTrust CA-Top Secret, all
- Page 163 and 164: Indexcomponent names for z/OS and O
- Page 165 and 166: OpenEdition MVS supportACIDs needed
AppendixBRACF to <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong>TranslationMany applications <strong>and</strong> products describe the setup <strong>for</strong> external security in RACFterms. The purpose of this Appendix is to describe what the RACF terminologymeans so a <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> administrator can take the in<strong>for</strong>mation <strong>and</strong>create the necessary <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> records to implement it.Use the following chart to check the corresponding <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> feature.Feature RACF <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong>Users/GroupsResourceProtectionSPECIAL GroupconceptData SetsDASD volumesTape volumesTerminalsLoad modules(programs)IMS applicationgroup names(AIMS)IMS transactions(TIMS <strong>and</strong> GIMS)IMS applicationsCICS PSBsCICS transactionsCICS filesCICS journalsCICS programsMS<strong>CA</strong>, LS<strong>CA</strong>s, Zones, Divisions,Departments, Profiles, ACIDsData Sets (DSN)DASD volumes (VOL)Tape volumes (VOL)Terminals (TERM, SOURCE)Programs (PROG)IMS applications (APPL)Transactions via Limited Comm<strong>and</strong> Facility(LCF) or protected resources (OTRAN)Facility checkingCICS PSBsTransactions via Limited Comm<strong>and</strong> Facility(LCF) or protected resources (OTRAN)CICS files (FCT)CICS journals (JCT)CICS programs (PPT)RACF to <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> Translation B–1