12.07.2015 Views

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

KerberosIt must be placed earlier in the path than the following to avoid DCE/Kerberosfrom overriding more recent Kerberos software./binAny /bin DCE subdirectoryAny Kerberos session variables which the user wishes to set differently than thevalues in the Kerberos environment file should be set in the user’s .profile file.Consult IBM SecureWay <strong>Security</strong> Server Network Authentication ServiceAdministration <strong>for</strong> complete details. If any file names are specified, theadministrator must provide appropriate HFSSEC permissions in order to accessthem.DCE IncompatibilityDCE comm<strong>and</strong>s conflict with Kerberos comm<strong>and</strong>s. Clients wishing to make useof these separate features should make changes to their environments as outlinedin IBM SecureWay <strong>Security</strong> Server Network Authentication ServiceAdministration.<strong>Security</strong> ConsiderationsA number of attributes must be present on an ACID in order to assure thecapability <strong>for</strong> the Kerberos kinit function. The assumption <strong>for</strong> examples here isthat HFSSEC(ON) has been set:■■■■■■The ACID must be given st<strong>and</strong>ard OMVS attributes:TSS ADD(local) UID(uid_number) GROUP(omvsgrp) DFLTGRP(omvsgrp)HOME(home_directory) OMVSPGM(program_directory)The ACID must be given permission to change the mode of their own files:TSS PERMIT(local) IBMFAC(BPX.<strong>CA</strong>HFS.FILE.MODE)The ACID must be able to create, alter, execute <strong>and</strong> read files in the homedirectory. Kerberos credentials will be created in this directory.TSS PERMIT(local) HFSSEC(home_directory) ACC(ALL)The ACID must be able to READ <strong>and</strong> EXECUTE files in the programdirectory.TSS PERMIT(local) HFSSEC(program_directory) ACC(READ,EXEC)To access Kerberos comm<strong>and</strong> files at run-time, the user will need thefollowing:TSS PER(useracid) HFSSEC(/usr.lpp.skrb.bin)To access Kerberos EXEC files enter the following comm<strong>and</strong>s:TSS PER(useracid) DATASET(EUVF.SEUVFEXC) ACC(READ)1–86 Cookbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!