12.07.2015 Views

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

OpenEdition MVS / UNIX System Services SupportTo create a Superuser Administrator acid <strong>and</strong> give it the authority it needs,follow these directions:Step 1—Define the acid as a superuser by issuing the following TSS comm<strong>and</strong>:TSS ADD(acid) UID(0)ACID SYSPROG1 is defined as a superuser by setting the UID value to zero.Step 2—Define SYSPROG1 as a member of a group by issuing:TSS ADD(acid) GROUP(OMVSGRP) DFLTGRP(OMVSGRP)The example shows ACID SYSPROG1 changed so that this user can sign on <strong>and</strong>be validated as a member of group OMVSGRP. The acids of group OMVSGRPare a special subset of users who per<strong>for</strong>m system-related tasks.Superuser GranularitySuperuser Granularity support lets you avoid giving users superuser authorityvia UID(0). This is accomplished by allowing non-superuser users to have accessto new resources in the UNIXPRIV class. At <strong>OS</strong>/390 V2R8 <strong>and</strong> above, if a userdoesn't have a UID=0, but they do have access to one of the new resources,access is allowed. The following table defines the new resources <strong>and</strong> what accessis allowed by the resource.<strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> SAF HFS security provides much greater superusergranularity than this method. See Chapter 2 of this guide <strong>for</strong> details onimplementing <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong>'s SAF HFS security. Activating <strong>eTrust</strong><strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> SAF HFS security will override the superuser granularitysupport described in this section if there is an equivalent SAF HFS securityresource <strong>for</strong> the UNIXPRIV resource. If there is no SAF HFS resource, theUNIXPRIV resource is checked instead.Resource Name Access Given Functions AffectedSUPERUSER.FILESYS.FILE (READaccess or higher)SUPERUSER.FILESYS.FILE(UPDATE access or higher)SUPERUSER.FILESYS.FILE(CONTROL Access)SUPERUSER.FILESYS.CHOWNAllows a user to read any HFSfile <strong>and</strong> read or search anyHFS directoryAllows a user to write to anyexisting HFS file.Allows a user to write to anyHFS directory.Allows a user to changeownership of any file.Open*( <strong>for</strong> read, opendir(),readlink(), stat(), realpath(0)Open() <strong>for</strong> writeLink(), mkdir(), rename(),mdir(), syslink(), unlink().Chown()1–16 Cookbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!