12.07.2015 Views

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Using TCP/IPSet all other FACILITY parameters according to your site-specific needs.Note: If the RES attribute is omitted from the FACILITY definition, no user orprofile data set rules are loaded into the TCP address space.Step 2—Create a Region acid.The comm<strong>and</strong> used to create this acid should look like the example shown in thefollowing.TSS CRE(TCP) NAME('TCPIP/FTP REGION ACID') FAC(BATCH,STC)PASS(password,0) DEPT(DEPT) MASTFAC(TCP)NOVOLCHK NODSNCHK NOLCFCHK NORESCHK N<strong>OS</strong>UBCHKTSS ADD(TCP) UID(0) GROUP(OMVSGRP)DFLTGRP(OMVSGRP) HOME(/)OMVSGPGM (/bin/sh)The Region acid must have:■■The NODSNCHK attribute or a permit <strong>for</strong> DSN(*****) ACC(ALL).The N<strong>OS</strong>UBCHK attribute. If this attribute is omitted, DRC157 errors onsubmit of batch jobs from the TCP address space will occur.To properly secure job submission, the JES facility must be in FAIL MODE.Step 3—Define the TCP procedure to the <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> STC Record.TSS ADD(STC) PROCNAME(TCPPROC) ACID(TCP)TCP/IP SERVAUTH ClassTCP/IP in <strong>OS</strong>/390 2.10 uses the SERVAUTH resource class to protect TCP/IPresources from unauthorized access. There are four functions protected by theSERVAUTH class. They are:Stack Access—Controls which users can get access to the TCP/IP stack.Resource name: EZB.STACKACCESS.sysname.tcpipidNet Access—Controls which users can access individual networks.Resource name: EZB.NETACCESS.sysname.tcpipid.netnamePort Access—Controls which users can use TCP <strong>and</strong> UDP ports.Resource name: EZB.PORTACCESS.sysname.tcpipid.portnameTN3270 controls which users can use the secured ports.Resource name: EZB.TN3270.sysname.tcpipid.PORTnnnn1–30 Cookbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!