eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect
eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect
Lotus Domino Go WebserverInstalling Domino Go Webserver on a eTrust CA-Top Secret-secured SystemNote: Previously defined UNIX System Services and TCP/IP requirements musthave been completed before you attempt to install the Domino Go Webserver.The examples in the following steps reflect default procnames, typical groupnames, and typical GID value. Overall, these commands simply ensure that avalid OMVS UID and GID exist for each of the started tasks that access OMVS.1. A TSS FACILITY should be created for the web server. Once created, thisfacility can be added to each user acid that is allowed to log on to the webserver. Tailor the following command and then add it to the existing eTrustCA-Top Secret startup control options:TSS MODIFY FAC(USERx=NAME=IMWEB)2. The Domino Go Webserver requires an acid for the web server started taskand for a web administrator. Both of these acids must be connected to anOMVS Group ID for the web server. The following commands accomplishthis using the IBM default values.The web server started task, whose procname is IMWEBSRV, is also referredto by IBM as the web server daemon. Also, changing the ID of the webadministrator is recommended; however, this change must be coordinatedwith updates to the web server configuration file.TSS CRE(IMWEB) TYPE(GROUP) NAME('WEBSERVER GROUP') DEPT(anydept)TSS ADD(IMWEB) GID(205)TSS CRE(WEBADM) TYPE(USER) NAME('WEB ADMINISTRATOR')DEPT(anydept) FAC(IMWEB) PASSWORD(password,0)TSS ADD(WEBADM) UID(206) GROUP(IMWEB) DFLTGRP(IMWEB)HOME(/usr/lpp/internet) OMVSPGM(/bin/sh)TSS CRE(WEBSRV) TYPE(USER) NAME('WEBSERVER DAEMON/STC')DEPT(dept) FAC(STC,IMWEB)PASSWORD(password,0)TSS ADD(WEBSRV) UID(0) GROUP(IMWEB) DFLTGRP(IMWEB)HOME(/usr/lpp/internet) OMVSPGM(/bin/sh)MASTFAC(IMWEB)TSS ADD(STC) PROCNAME(IMWEBSRV) ACID(WEBSRV)3. Three other user acids, each having their own connected group, are requiredunless "surrogate user" support is disabled. This feature permits users toaccess the web server without requiring a signon. CA recommends that thisfeature be disabled for security reasons.1–48 Cookbook
Lotus Domino Go WebserverTo disable this feature, change the "Userid" option to "%%CLIENT%%"within the web server configuration file. See IBM documentation. If notdisabled, the following commands will create acids and groups for surrogatesupport following IBM examples:TSS CRE(EXTERNAL) TYPE(GROUP) NAME('WEB GROUP') DEPT(dept)TSS ADD(EXTERNAL) GID(999)TSS CRE(EMPLOYEE) TYPE(GROUP) NAME('WEB GROUP') DEPT(dept)TSS ADD(EMPLOYEE) GID(500)TSS CRE(SPECIAL) TYPE(GROUP) NAME('WEB GROUP') DEPT(dept)TSS ADD(SPECIAL) GID(255)TSS CRE(PUBLIC) TYPE(USER) NAME('WEB SURROGATE ID')DEPT(dept) FAC(IMWEB) PASSWORD(NOPW,0)TSS ADD(PUBLIC) UID(998) GROUP(EXTERNAL) DFLTGRP(EXTERNAL)HOME(/) OMVSPGM(/bin/sh)TSS CRE(INTERNAL) TYPE(USER) NAME('WEB SURROGATE ID')DEPT(dept) FAC(IMWEB) PASSWORD(NOPW,0)TSS ADD(INTERNAL) UID(537) GROUP(EMPLOYEE) DFLTGRP(EMPLOYEE)HOME(/) OMVSPGM(/bin/sh)TSS CRE(PRIVATE) TYPE(USER) NAME('WEB SURROGATE ID')DEPT(dept) FAC(IMWEB) PASSWORD(NOPW,0)TSS ADD(PRIVATE) UID(416) GROUP(SPECIAL) DFLTGRP(SPECIAL)HOME(/) OMVSPGM(/bin/sh)4. The acid for the web server started task (that is, Daemon) requires access tothe following IBMFAC and SURROGAT resources. Note that the final threepermits are not needed if surrogate support is disabled:TSS ADD(dept) IBMFAC(BPX.)TSS PERMIT(WEBSRV) IBMFAC(BPX.DAEMON) ACCESS(READ)TSS PERMIT(WEBSRV) IBMFAC(BPX.SERVER) ACCESS(UPDATE)TSS ADD(dept) SURROGAT(BPX.)TSS PERMIT(WEBSRV) SURROGAT(BPX.SRV.WEBADM) ACCESS(READ)TSS PERMIT(WEBSRV) SURROGAT(BPX.SRV.PUBLIC) ACCESS(READ)TSS PERMIT(WEBSRV) SURROGAT(BPX.SRV.PRIVATE) ACCESS(READ)TSS PERMIT(WEBSRV) SURROGAT(BPX.SRV.INTERNAL) ACCESS(READ)5. IBM documentation includes one install step where "RACF program control"is discussed. In the first part of this step, all users are given read access tothree load libraries related to the web server. This part is easily translated asfollows:TSS ADD(dept) DSNAME(CEE.)TSS ADD(dept) DSNAME(IMW.)TSS ADD(dept) DSNAME(SYS1.)TSS PERMIT(ALL) DSNAME(CEE.V1R5M0.SCEERUN)TSS PERMIT(ALL) DSNAME(IMW.V1R1M0.IMWMOD1)TSS PERMIT(ALL) DSNAME(SYS1.LINKLIB)ACCESS(READ)ACCESS(READ)ACCESS(READ)This step also describes several (RDEFINE and SETROPTS) commandsneeded to exempt the above libraries from RACF "PADS" checking. Thesecommands are not applicable to eTrust CA-Top Secret and can be skipped.Implementing eTrust CA-Top Secret in a z/OS or OS/390 Environment 1–49
- Page 8 and 9: WLM (Workload Management)..........
- Page 11 and 12: Chapter1Implementing eTrust CA-TopS
- Page 13 and 14: z/OS and OS/390 CompatibilityThe li
- Page 15 and 16: z/OS and OS/390 Release-Specific Se
- Page 17 and 18: OpenEdition MVS / UNIX System Servi
- Page 19 and 20: OpenEdition MVS / UNIX System Servi
- Page 21 and 22: OpenEdition MVS / UNIX System Servi
- Page 23 and 24: OpenEdition MVS / UNIX System Servi
- Page 25 and 26: OpenEdition MVS / UNIX System Servi
- Page 27 and 28: OpenEdition MVS / UNIX System Servi
- Page 29 and 30: OpenEdition MVS / UNIX System Servi
- Page 31 and 32: Tracing UNIX System Services (OMVS)
- Page 33 and 34: Tracing UNIX System Services (OMVS)
- Page 35 and 36: Tracing UNIX System Services (OMVS)
- Page 37 and 38: Tracing UNIX System Services (OMVS)
- Page 39 and 40: Using TCP/IPFILE AUDIT OPTIONS—Th
- Page 41 and 42: Using TCP/IPwheresysname is the nam
- Page 43 and 44: Using FTPHow to Secure FTPFTP runs
- Page 45 and 46: Using TELNETTerminal Source Restric
- Page 47 and 48: WebSphere Application Server for z/
- Page 49 and 50: WebSphere Application Server for z/
- Page 51 and 52: WebSphere Application Server for z/
- Page 53 and 54: WebSphere Application Server for z/
- Page 55 and 56: WebSphere Application Server for z/
- Page 57: Lotus Domino Go Webserver/* PERMITT
- Page 61 and 62: Lotus Notes and Novell Directory Se
- Page 63 and 64: Digital Certificate SupportGeneral
- Page 65 and 66: Digital Certificate SupportFOR|UNTI
- Page 67 and 68: Digital Certificate SupportDCDSN(re
- Page 69 and 70: Digital Certificate SupportNote: In
- Page 71 and 72: Digital Certificate SupportYou can
- Page 73 and 74: Digital Certificate SupportCase #2.
- Page 75 and 76: Digital Certificate SupportImportan
- Page 77 and 78: Digital Certificate SupportAdding a
- Page 79 and 80: Digital Certificate SupportReconnec
- Page 81 and 82: Digital Certificate SupportTSS LIST
- Page 83 and 84: Certificate Name Filtering SupportT
- Page 85 and 86: Certificate Name Filtering SupportI
- Page 87 and 88: Certificate Name Filtering SupportD
- Page 89 and 90: Certificate Name Filtering SupportL
- Page 91 and 92: KerberosKerberosetrust CA-Top Secre
- Page 93 and 94: KerberosThe command syntax for this
- Page 95 and 96: KerberosThe following command creat
- Page 97 and 98: Mapping of Foreign EnvironmentsMapp
- Page 99 and 100: Mapping of Foreign EnvironmentsMapp
- Page 101 and 102: Distributed File Server SMB SUPPORT
- Page 103 and 104: NFS (Network File System)The first
- Page 105 and 106: z/OS and OS/390 Security Server Sup
- Page 107 and 108: z/OS and OS/390 Security Server Sup
Lotus Domino Go WebserverTo disable this feature, change the "Userid" option to "%%CLIENT%%"within the web server configuration file. See IBM documentation. If notdisabled, the following comm<strong>and</strong>s will create acids <strong>and</strong> groups <strong>for</strong> surrogatesupport following IBM examples:TSS CRE(EXTERNAL) TYPE(GROUP) NAME('WEB GROUP') DEPT(dept)TSS ADD(EXTERNAL) GID(999)TSS CRE(EMPLOYEE) TYPE(GROUP) NAME('WEB GROUP') DEPT(dept)TSS ADD(EMPLOYEE) GID(500)TSS CRE(SPECIAL) TYPE(GROUP) NAME('WEB GROUP') DEPT(dept)TSS ADD(SPECIAL) GID(255)TSS CRE(PUBLIC) TYPE(USER) NAME('WEB SURROGATE ID')DEPT(dept) FAC(IMWEB) PASSWORD(NOPW,0)TSS ADD(PUBLIC) UID(998) GROUP(EXTERNAL) DFLTGRP(EXTERNAL)HOME(/) OMVSPGM(/bin/sh)TSS CRE(INTERNAL) TYPE(USER) NAME('WEB SURROGATE ID')DEPT(dept) FAC(IMWEB) PASSWORD(NOPW,0)TSS ADD(INTERNAL) UID(537) GROUP(EMPLOYEE) DFLTGRP(EMPLOYEE)HOME(/) OMVSPGM(/bin/sh)TSS CRE(PRIVATE) TYPE(USER) NAME('WEB SURROGATE ID')DEPT(dept) FAC(IMWEB) PASSWORD(NOPW,0)TSS ADD(PRIVATE) UID(416) GROUP(SPECIAL) DFLTGRP(SPECIAL)HOME(/) OMVSPGM(/bin/sh)4. The acid <strong>for</strong> the web server started task (that is, Daemon) requires access tothe following IBMFAC <strong>and</strong> SURROGAT resources. Note that the final threepermits are not needed if surrogate support is disabled:TSS ADD(dept) IBMFAC(BPX.)TSS PERMIT(WEBSRV) IBMFAC(BPX.DAEMON) ACCESS(READ)TSS PERMIT(WEBSRV) IBMFAC(BPX.SERVER) ACCESS(UPDATE)TSS ADD(dept) SURROGAT(BPX.)TSS PERMIT(WEBSRV) SURROGAT(BPX.SRV.WEBADM) ACCESS(READ)TSS PERMIT(WEBSRV) SURROGAT(BPX.SRV.PUBLIC) ACCESS(READ)TSS PERMIT(WEBSRV) SURROGAT(BPX.SRV.PRIVATE) ACCESS(READ)TSS PERMIT(WEBSRV) SURROGAT(BPX.SRV.INTERNAL) ACCESS(READ)5. IBM documentation includes one install step where "RACF program control"is discussed. In the first part of this step, all users are given read access tothree load libraries related to the web server. This part is easily translated asfollows:TSS ADD(dept) DSNAME(CEE.)TSS ADD(dept) DSNAME(IMW.)TSS ADD(dept) DSNAME(SYS1.)TSS PERMIT(ALL) DSNAME(CEE.V1R5M0.SCEERUN)TSS PERMIT(ALL) DSNAME(IMW.V1R1M0.IMWMOD1)TSS PERMIT(ALL) DSNAME(SYS1.LINKLIB)ACCESS(READ)ACCESS(READ)ACCESS(READ)This step also describes several (RDEFINE <strong>and</strong> SETROPTS) comm<strong>and</strong>sneeded to exempt the above libraries from RACF "PADS" checking. Thesecomm<strong>and</strong>s are not applicable to <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> <strong>and</strong> can be skipped.Implementing <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> in a z/<strong>OS</strong> or <strong>OS</strong>/390 Environment 1–49