12.07.2015 Views

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Using TCP/IPwheresysname is the name of the systemtcpipid is the name of the TCP/IP started tasknetname is the network name in PROFILE.TCPIPportname is the port name in PROFILE.TCPIPnnnn is the port number with leading zero'sSee the IBM <strong>OS</strong>/390 V2R10 IP Configuration Guide <strong>for</strong> additional in<strong>for</strong>mationabout these functions.Support <strong>for</strong> the SERVAUTH class is available beginning with <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong><strong>Secret</strong> 5.1 SP04. For earlier maintenance levels, you must apply APAR LO82040,which is required when using <strong>OS</strong>/390 2.10. This APAR adds an internal RDTentry <strong>for</strong> SERVAUTH. You must add rules giving READ access to theSERVAUTH resources to acids that require access. If no rule allowing accessexists, you can receive several different error messages, including:EDC5111I permission deniedThe EZB.STACKACCESS violation is seen on all systems running <strong>OS</strong>/390 2.10that do not have rules allowing access. Calls <strong>for</strong> the other three functions are notmade unless additional setup is done in PROFILE.TCPIP. See the IBM <strong>OS</strong>/390V2R10 IP Configuration Guide <strong>for</strong> additional in<strong>for</strong>mation.To allow access to these resources, issue the following comm<strong>and</strong>s to define theresource to <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong>:TSS ADD(dept) SERVAUTH(EZB.)TSS PER(dept) SERVAUTH(EZB.STACKACCESS.) ACC(READ)TSS PER(dept) SERVAUTH(EZB.NETACCESS.) ACC(READ)TSS PER(dept) SERVAUTH(EZB.PORTACCESS.) ACC(READ)TSS PER(dept) SERVAUTH(EZB.TN3270.) ACC(READ)VMCF <strong>and</strong> TNF subsystems (<strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> started be<strong>for</strong>e JES)If a restartable VMCF <strong>and</strong> TNF subsystems are to be used, add to the <strong>eTrust</strong><strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> STC table the following started task entries: VMCF, TNF,EZAZSSI.TSS ADD(STC) PROCNAME(VMCF) ACID(acid)TSS ADD(STC) PROCNAME(TNF) ACID(acid)The acids associated with these STCs require access to facility STC <strong>and</strong> data sethlq SEZATCP.TSS ADD(dept) DSNC(SEZATCP.)TSS PER(acid) DSN(SEZATCP.) ALL(READ)Implementing <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> in a z/<strong>OS</strong> or <strong>OS</strong>/390 Environment 1–31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!