12.07.2015 Views

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Tracing UNIX System Services (OMVS)GID(value)—Specifies the UNIX System Services MVS GroupID <strong>for</strong> which youintend to collect security in<strong>for</strong>mation. Acceptable numeric values range fromzero to 2,147,483,647. This field is not maskable.USER(acid)—Specifies the acid <strong>for</strong> which you want UNIX System Services MVSsecurity in<strong>for</strong>mation collected. This field is not maskable.GROUP(acid)—Specifies the group <strong>for</strong> which you want UNIX System ServicesMVS security in<strong>for</strong>mation collected. This field is not maskable.SERVICE(service)—Specifies the name of the SAF callable service <strong>for</strong> which youwant security in<strong>for</strong>mation collected.TSSOERPT Output DescriptionTSSOERPT <strong>for</strong>mats <strong>and</strong> reports security events occurring in the UNIX SystemServices environment. The output is extracted from the System ManagementFacility (SMF) data sets.The following is a sample of the output of TSSOERPT with DETAIL specified inthe job. TSSOERPT shows the logging of security events in an UNIX SystemServices MVS environment:02/02/98 98.033 11.54.44 — OMVS LOGGING REPORT — PAGE 1SERVICE USERID GROUP UID GID SAF RC RSNDATE TIME JOBNAME SOURCE SYSID CPUINIT_USP STRTE01 OMVSGRP 0 2 0 0 002/02/98 98.033 11:52:50 STRTE01 XE14 XE14Home : /U/STRTE01CHECK_ACCESS STRTE01 OMVSGRP 0 2 0 0 002/02/98 98.033 11:52:51 STRTE01 XE14 XE14Requested Access: SearchFunction: chdirUser Type: <strong>Security</strong> Defined Local UserPathname: /U/STRTE01Filename: /ROOTVolume : SMS001 Owner: rwx Group: --- Other: ---File Identifier: 000107000000000003Owning UID: 0 Owning GID: 0User Audit Options : Read Failure Write Failure Exec/Search FailureAuditor Audit Options: Read Failure Write Failure Exec/Search FailureDELETE_USP STRTE01 OMVSGRP 0 0 0 0 002/02/98 98.033 11:52:52 STRTE01 XE14 XE14This sample output shows one log entry <strong>for</strong> a INIT_USP request, one entry <strong>for</strong> aCHECK_ACCESS request, <strong>and</strong> one entry <strong>for</strong> a DELETE_USP request.In this example, the services of INIT_USP <strong>and</strong> DELETE_USP result in two-linelog entries consisting of field in<strong>for</strong>mation. The CHECK_ACCESS request resultsin log entries that consist of two lines plus additional lines of in<strong>for</strong>mation aboutthe request. This happens because different in<strong>for</strong>mation is logged <strong>for</strong> differenttypes of requests.Implementing <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> in a z/<strong>OS</strong> or <strong>OS</strong>/390 Environment 1–23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!