12.07.2015 Views

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

WebSphere Application Server <strong>for</strong> z/<strong>OS</strong> AND <strong>OS</strong>/390You can use the CBIND class to restrict a client’s ability to access servers. Thereare two types of resources, WebSphere <strong>for</strong> z/<strong>OS</strong> uses in the CBIND class:■One that controls whether a local or remote client can access servers.The name of the resource has this <strong>for</strong>m:CB.BIND.server_namewhere server_name is the name of the server.■One that controls whether a client can use objects in a server. The name ofthe resource has this <strong>for</strong>m:CB.server_namewhere server_name is the name of the server.Note: When you add a new server, you must authorize all systemsmanagement user IDs (<strong>for</strong> example, CBADMIN) to have read access to theCB.server_name <strong>and</strong> CB.BIND.server_name resources.Example:CBADMIN needs read authority to the CB.BBOASR1 <strong>and</strong>CB.BIND.BBOASR1 servers:TSS ADD(deptacid) CBIND(CB.)TSS PERMIT(CBADMIN) CBIND(CB.BBOASR1) ACCESS(READ)TSS PERMIT(CBADMIN) CBIND(CB.BIND.BBOASR1) ACCESS(READ)Use the EJBROLE (or GEJBROLE) class in <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> to control aclient’s access to enterprise beans. There are two distinct sets of tasks that arerequired to protect an application using EJB roles.■The security administrator must define the roles <strong>and</strong> set up access rights in<strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong>.– Define a profile name using the EJBROLE (or GEJBROLE) class.Example:TSS ADD(dept) EJBROLE(ROLE_NAME)Where department is a department already defined in the <strong>Top</strong> <strong>Secret</strong>database <strong>and</strong> role_name matches the security role attribute specified inthe jar file or <strong>for</strong> the application. A role name cannot contain blanks, <strong>and</strong>cannot exceed 245 characters. Role names, however, can be in mixedcase.Create membership in the role by permitting <strong>Top</strong> <strong>Secret</strong> userID’s orprofiles permission to the defined EJBROLE resource.Example:TSS PERMIT(acid) EJBROLE(role_name)Implementing <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> in a z/<strong>OS</strong> or <strong>OS</strong>/390 Environment 1–41

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!