12.07.2015 Views

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

WebSphere Application Server <strong>for</strong> z/<strong>OS</strong> AND <strong>OS</strong>/390■The application assembler must assign method permissions to the bean ormethod using the Application Assembly Tool.– Define the roles relevant to the application. These role names mustmatch the resource names defined to <strong>Top</strong> <strong>Secret</strong>.– Once defined, the role can be assigned to access an application (as amethod permission).– After the application assembly is complete, the application must bereinstalled using the Administration application.Use the SOMDOBJS class in <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> to control a client’s accessto CORBA objects. Resource names in SOMDOBJS have the <strong>for</strong>m:■server_name.home.methodWhere server_name is the server name. It must be 8 characters or less. homeis the home name. It must be 192 characters or less. method is the methodname. It can be up to the length of the remainder of 244 minus the sum of theserver <strong>and</strong> home name lengths.Example:If the server name is 8 characters, <strong>and</strong> the home name is:128 characters, the method name can be 108 (244 - (8 + 128)). If a method isprotected by SOMDOBJS <strong>and</strong>:– A client program is using the method to update an attribute of an object,give the client UPDATE authorization <strong>for</strong> the method.– A client program is using the method to read an attribute of an object,give the client READ authorization <strong>for</strong> the method.All names are folded into uppercase characters, regardless of how youenter them. Thus, there is no difference betweenMY_server.MY_home.MY_method <strong>and</strong>MY_SERVER.MY_HOME.MY_METHOD.In addition to the SOMDOBJS definitions, you must specifymethod-level access checking through the WebSphere <strong>for</strong> z/<strong>OS</strong>Administration application. Check the box <strong>for</strong> method-level accesschecking when you define your application’s container.Resource managers such as DB2, IMS, <strong>and</strong> CICS have implemented theirown resource controls, which control the ability of clients to access resources.When resource controls are used by DB2, use the DSNR <strong>Top</strong> <strong>Secret</strong> class orissue the relevant DB2 GRANT statements.Access to OTMA <strong>for</strong> IMS access is through the IBMFAC Class(IMSXCF.OTMACI). Access to EXCI <strong>for</strong> CICS is through the SURROGATclass (*.DFHEXCI). You can control access to data sets through the DATASETclass <strong>and</strong> HFS files through file permissions or the HFSSEC class.1–42 Cookbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!