13.07.2015 Views

eTrust™CA-ACF2® Security for z/OS and OS/390 ... - SupportConnect

eTrust™CA-ACF2® Security for z/OS and OS/390 ... - SupportConnect

eTrust™CA-ACF2® Security for z/OS and OS/390 ... - SupportConnect

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PrefaceEnclosed is a Product Maintenance Letter (PML) along with any high-impactAPARs relevant to the accompanying product tape. You should review thisdocument be<strong>for</strong>e installing eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>.The PML provides additional product in<strong>for</strong>mation that is not yet incorporatedinto documentation.If you have any questions concerning the enclosed material, contact yourComputer Associates Technical Support organization <strong>for</strong> eTrust CA-ACF2<strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>. Refer to Computer Associates Product SupportDirectory or the CA Support web site at Contacting CA Technical Support(http://support.ca.com/contact/netsupp.html) <strong>for</strong> the appropriate telephonenumbers <strong>for</strong> direct support.PIB List:QI43701: Release 6.5 Service Pack SP01, of eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong><strong>and</strong> <strong>OS</strong>/<strong>390</strong> Product Maintenance LetterAugust 2003 3 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


END OF SECTIONAugust 2003 4 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


Computer Associates International, Inc.2400 Cabot DriveLisle, IL 60532-36521-630-505-6000FAX: 1-630-505-6097To:From:eTrust CA-ACF2 ® <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> ClientsThe Computer Associates eTrust CA-ACF2 Product GroupDate: August 29, 2003Subject: Release 6.5 Service Pack SP01of eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> ProductMaintenance Letter PML# QI43701Dear Valued Client:Computer Associates International Inc. is pleased to present you with the latest Service pack SP01 <strong>for</strong>Release 6.5 of eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> (eTrust CA-ACF2), an integral componentof the family of solutions we provide <strong>for</strong> the z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> operating systems.We are dedicated to ensuring that your use of eTrust CA-ACF2 is successful <strong>and</strong> we want to thank you<strong>for</strong> your continued support of Computer Associates. If you have any questions regarding this softwaresolution, contact your local eTrust CA-ACF2 Technical Support group. Also, visit our support web site athttp://support.ca.com.Software PrerequisitesYour IBM software must meet these minimum requirements to operate thisrelease of eTrust CA-ACF2:• <strong>OS</strong>/<strong>390</strong> Version 2 Release 9 <strong>and</strong> above (including z/<strong>OS</strong> Version 1Release 4)• JES2 <strong>OS</strong>/<strong>390</strong> Version 2 Release 8• JES3 <strong>OS</strong>/<strong>390</strong> Version 2 Release 9• DFSMS 1.2.0 <strong>and</strong> above• ACF/VTAM 3.4.2 <strong>and</strong> above• PSF MVS 2.1.0 <strong>and</strong> above (required <strong>for</strong> eTrust CA-ACF2 M<strong>and</strong>atory AccessControl [MAC])


If you are running any of the following software, it must meet these requirementsto run concurrently with this release of eTrust CA-ACF2:• CICS/ESA Release 4.1 <strong>and</strong> above• IMS Version 6 Release 1 <strong>and</strong> above• CA Common Services <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> Release 1.0, Genlevel 9901 oraboveCA Common Services <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> PrerequisitesGetting Started1. Be<strong>for</strong>e you install the eTrust CA-ACF2 Release 6.5 product tape(65SP01AJ100), we highly recommend that you install Release 2.2 ofCA Common Services <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> at the SP03 Service pack.The Computer Associates Quality Assurance group per<strong>for</strong>med finalintegration tests at this level. You must have CA Common ServicesRelease 1.0 installed at the 9901 Genlevel be<strong>for</strong>e applying this eTrustCA-ACF2 product tape.2. CAIRIM is m<strong>and</strong>atory <strong>for</strong> eTrust CA-ACF2. It must be installed <strong>and</strong>started with eTrust CA-ACF2 within 30 minutes of IPL time. See"Section B - CAIRIM <strong>and</strong> LMP Keys" <strong>for</strong> more in<strong>for</strong>mation.1. This eTrust CA-ACF2 Release 6.5 product tape must be installed usingSMP/E. CA-Activator® install support is not available with this release.2. Review all enclosed PMLs <strong>and</strong> PTFs to determine if they pertain to yourenvironment. Pay special attention to the "General In<strong>for</strong>mation" <strong>and</strong>"Summary of Changes" sections. The following previously publishedeTrust CA-ACF2 Release 6.5 Product In<strong>for</strong>mation Bulletin (PIB) isavailable in file 28, ACF2.PMLLIB (the ACFMAINT job contains JCLto unload this file).• Release 6.5 GA Base: PIB QI336133. If you are migrating to eTrust CA-ACF2 Release 6.5 Service pack SP01from eTrust CA-ACF2 Release 6.3 or an earlier release, you must beaware of the product enhancements <strong>and</strong> changes made to eTrustCA-ACF2 Release 6.4. eTrust CA-ACF2 Release 6.5 is a functionallyrich release that offers numerous client-requested administrative <strong>and</strong>technical enhancements. Additionally, product changes <strong>and</strong>enhancements are made available on an ongoing basis throughdistribution of regular product updates or service packs.eTrust CA-ACF2 Release 6.5 builds upon the Release 6.4 foundation <strong>and</strong>provides additional functionality that extends many of the eTrustCA-ACF2 Release 6.4 features. You can get further in<strong>for</strong>mation abouteTrust CA-ACF2 Release 6.4 changes from the following sources:August 2003 2 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


Release 6.4 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> ReleaseGuide.The following Release 6.4 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong><strong>OS</strong>/<strong>390</strong> Product Maintenance Letters:• Service pack SP04: PML QI37803• Service pack SP03: PML QI29702• Service pack SP02: PML QI12971• Service pack SP01: PML QI00734• Release 6.4 GA Base: PIB LI91544Note: All of these PMLs can be obtained through StarTCC using the“Browse/download solutions" function specifying the QIxxxxx/LIxxxxxnumber as an APAR number. You can obtain the eTrust CA-ACF2Release 6.4 documentation from the CA Systems Library <strong>for</strong> z/<strong>OS</strong> <strong>and</strong><strong>OS</strong>/<strong>390</strong> Documentation CD. In addition, the documentation <strong>for</strong> Release6.4 is available on the eTrust CA-ACF2 eSupport web site at thefollowing locations:http://esupport.ca.com or the eTrust CA-ACF2 Support web site athttp://support.ca.com/ca-acf2os<strong>390</strong>supp.html4. Read “Section A – Installation” or “Section B – MaintenanceInstallations.”5. Installation instructions <strong>for</strong> eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> CICS can befound in the eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> CICSSupport Guide. eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> IMS installationinstructions can be found in the eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong><strong>OS</strong>/<strong>390</strong> IMS Support Guide <strong>and</strong> IMS Batch Support Guide.6. The documentation set <strong>for</strong> eTrust CA-ACF2 Release 6.5 includes thelatest technology available <strong>for</strong> online viewing, keyword searching, bookmarking, <strong>and</strong> printing. The eTrust CA-ACF2 Release 6.5 documentationset is available in Adobe Acrobat Reader <strong>for</strong>mat on the CA eSupport website at http://esupport.ca.com or the CA Support web site athttp://support.ca.com/premium/ca-acf2/manuals/os<strong>390</strong>index.html . Also,the documentation set is available in IBM BookManager <strong>and</strong> AdobeAcrobat Reader <strong>for</strong>mat on the tape. Use one of the following two jobs inCAI.ACF2.SAMPJCL to download these files. To unload the SAMPJCLlibrary, see "Be<strong>for</strong>e you Begin" in the "Installing eTrust CA-ACF2"chapter of the Release 6.5 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> <strong>OS</strong>/<strong>390</strong> <strong>and</strong>z/<strong>OS</strong> Getting Started guide.• For IBM BookManager, the CAI.ACF2.SAMPJCL (ACFBKMGR)job unloads the files. Modify the JCL to comply with your site'sst<strong>and</strong>ards. After you unload the file, modify the BKSHELF file tomatch any data set name changes made in the ACFBKMGR job.August 2003 3 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


• For Adobe Acrobat Reader, the CAI.ACF2.SAMPJCL(ACFACROB) job unloads the Adobe Acrobat PDF files. Modifythe JCL to comply with your site's st<strong>and</strong>ards. After you unload thefile, move the archive files using a binary transfer method to aplat<strong>for</strong>m that supports Adobe Acrobat Reader. See thehttp://www.adobe.com web site <strong>for</strong> a list of supported plat<strong>for</strong>ms <strong>and</strong>more in<strong>for</strong>mation. To unload the archive, use utilities native to thatplat<strong>for</strong>m. This is a Gzipped-TAR archive or TGZ file. For Windowsusers, several utilities exist, <strong>for</strong> example, WinZip 6.3 or higher.UNIX plat<strong>for</strong>ms can use gzip <strong>and</strong> tar.Note: To process the Release 6.5 Adobe Acrobat PDF files, your AdobeAcrobat Reader software must be at the Release 5.0 or higher level. Forfurther in<strong>for</strong>mation on supported releases, please see thehttp://www.adobe.com web site.General In<strong>for</strong>mationPlease note the label in<strong>for</strong>mation on your tape. The number 65SP01AJ100denotes the level of the tape. The volume serial number <strong>for</strong> this tape is J16501.The highest APAR <strong>for</strong> all FMIDs in this service pack is QO41452. The easiestway to obtain a list of all General Availability solutions beyond a service level isto visit our support page under Solutions <strong>and</strong> Patches <strong>and</strong> just point <strong>and</strong> click onthe desired service pack. The support page has also been enhanced to provide youwith all Hyper Solutions <strong>for</strong> a particular release. We encourage you to visit:http://support.ca.com/ca-acf2os<strong>390</strong>supp.html.This service pack supports the following IBM software releases:• <strong>OS</strong>/<strong>390</strong> Version 2 Release 9 <strong>and</strong> above• UNIX System Services (USS)• OpenEdition Distributed Computing Environment (DCE)• Lotus Notes Domino Go Webserver (also known as HTTP Server <strong>for</strong><strong>OS</strong>/<strong>390</strong>)• CICS Release 4.1 through CICS Transaction Server <strong>for</strong> <strong>OS</strong>/<strong>390</strong> Version 2Release 2• IMS Version 6 Release 1 through Version 8 Release 1When IBM releases a new version of <strong>OS</strong>/<strong>390</strong> or z/<strong>OS</strong>, Computer Associatesprovides an upgrade solution. This solution describes the maintenance required ineTrust CA-ACF2 to make it compatible with the new release of <strong>OS</strong>/<strong>390</strong> or z/<strong>OS</strong>.Upgrade (UPGRAD) solutions exist <strong>for</strong> each GA release of <strong>OS</strong>/<strong>390</strong> <strong>and</strong> z/<strong>OS</strong>.To receive the latest updates, download them from StarTCC athttp://esupport.ca.com or call Computer Associates Technical Support <strong>and</strong>request the specific <strong>OS</strong>/<strong>390</strong> or z/<strong>OS</strong> upgrade solution.August 2003 4 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


Summary of ChangesThe eTrust CA-ACF2 <strong>Security</strong> Cookbook <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> discussesimplementing UNIX <strong>for</strong> <strong>OS</strong>/<strong>390</strong> or z/<strong>OS</strong> in an eTrust CA-ACF2 environment. Italso discusses the changes to z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> that affect security in UNIXSystem Services. The latest version of the eTrust CA-ACF2 <strong>Security</strong> Cookbook<strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>, May 2003, is available on the eSupport <strong>and</strong> www.ca.comweb sites in Adobe Acrobat PDF <strong>for</strong>mat.If you are migrating from a prior release, genlevel, or service pack of eTrustCA-ACF2, we recommend that you read the Release 6.5 eTrust CA-ACF2<strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> Release Guide <strong>for</strong> all of the enhancements <strong>and</strong>changes in Release 6.5. The following changes <strong>for</strong> eTrust CA-ACF2 Release 6.5Service pack SP01 are detailed in this section.• Changes <strong>for</strong> JES3 Users with Program PathingJES3 sites using program pathing will notice additional validationsoriginating from the JES3 address space. The validations specifyPGM=IATINTKE <strong>and</strong> a LIB= value corresponding to your JES3 LINKLIB.If GSO LINKLIST records are inserted or changed to accommodate thesevalidations an F ACF2,REFRESH(LINKLST) comm<strong>and</strong> must be issued torefresh the LINKLST, <strong>and</strong> the JES3 address space must be recycled toactivate the LINKLST change in JES3.• Changes to R_datalib Callable Service ProcessingR_datalib callable service processing has been modified to con<strong>for</strong>m with thepublished documentation (in usage note 1) which dictates the conditionsunder which a certificate's private key can be returned. Prior to this change,R_datalib would erroneously return a certificate's private key if the certificatewas connected to a keyring with usage SITE. This behavior was not incon<strong>for</strong>mance with the documented specifications <strong>for</strong> the R_datalib callableservice. Sites that have already connected certificates to keyrings with usageSITE need to review their keyring setup <strong>and</strong> consider connecting thecertificate with usage PERSONAL rather than SITE if a private key needs tobe returned on the R_datalib call. Failure to do so may result inGSK_ERROR_NO_PRIVATE_KEY (-27) conditions starting servers.• Certificate Administration Resource CheckAPAR QO40132 improves administration of CERTDATA <strong>and</strong> KEYRINGuser profile records. Authorization to delete CERTDATA <strong>and</strong> KEYRINGuser profile records can now be administered using the following FACILITYclass resource entities:IRR.DIGTCERT.DELETE <strong>for</strong> CERTDATA recordsIRR.DIGTCERT.DELRING <strong>for</strong> KEYRING recordsIf the delete comm<strong>and</strong> is issued <strong>for</strong> a CERTDATA or KEYRING record thatbelongs to the user attempting the delete, at least READ access isrequired. To delete CERTDATA or KEYRING records that belong toAugust 2003 5 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


another user, at least UPDATE access is required. Deletion of CERTAUTH<strong>and</strong> SITECERT records requires CONTROL access.• Error Message Text ChangeACF2 FAILS W/ABEND S806 CAILPAM NOT FOUNDThe text of error message CAS4012E has been changed by APAR QO40774,the old text reads:CAS4012E - Invalid operating system level: MVS/ESA4.3 or above is required.The new text reads:CAS4012E - Unable to locate module CAILPAM.Initialization terminated.Note: The message ID was reused because it is no longer possible to run anoperating system release older than MVS/ESA 4.3.• $OWNER Now Allowed in 4K Resource RulesThe $OWNER resource rule control card was previously allowed only ifeTrust CA-ACF2 was operating in RULELONG mode. Any attempt to usethis control card if not operating in RULELONG mode resulted in errormessage:ACF70025 WARNING - $OWNER IS INVALID - FIELD ISIGNOREDThis control card is now accepted in all modes.• SHOW CACHESRV Comm<strong>and</strong>The ACF comm<strong>and</strong> has been enhanced to allow the comm<strong>and</strong> SHOWCACHESRV. When this comm<strong>and</strong> is issued, you will receive one of thefollowing output:Scenario #1: CACHESRV-hardening feature is not activatedACFSHOW CACHESRV-- GSO CACHESRV DEFINITIONS <strong>for</strong> R_cachesrv --R_cachesrv hardening is NOT ACTIVEAugust 2003 6 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


Scenario #2: CACHESRV-hardening feature is not activatedACFSHOW CACHESRV-- GSO CACHESRV DEFINITIONS <strong>for</strong> R_cachesrv --R_cachesrv hardening is ACTIVEThe R_cachesrv file name is HLQ.VSAM.FILECache Names Eligible For Hardening REALM------------------------------------------aaaaaaabbbbbbbccccccc• eTrust Audit EnhancementSupport <strong>for</strong> enhanced logging of events to the eTrust Audit product isprovided on this service pack.After installing this service pack, you will notice a new option, ETAUDIT,present in the GSO OPTS record. Setting this field will activate the routingof security event in<strong>for</strong>mation to eTrust Audit.This enhancement adds support <strong>for</strong> eTrust CA-ACF2 to send security eventnotification to outside security monitoring products, eTrust Audit <strong>and</strong>Unicenter TNG Monitor Facility.Communication with both products is per<strong>for</strong>med using the ENFSNMP event.eTrust CA-ACF2 passes the event in<strong>for</strong>mation to ENF with the event dataparameter. ENF then examines the in<strong>for</strong>mation passed <strong>and</strong> the followingactions are taken; if the event data is <strong>for</strong> Unicenter TNG, ENF sends theevent to Unicenter using SNMP traps. If it is <strong>for</strong> eTrust Audit, ENF sends theevents to eTrust Audit using SAPI (Audit API) calls.Important NoteBe<strong>for</strong>e activating the ETAUDIT option in eTrust CA-ACF2, you must ensurethat the fixes QO39451 <strong>and</strong> QO39446 have been applied to the CA CommonServices component.• Support the “COPY” parameter on RACROUTESupport is provided <strong>for</strong> the COPY parameter of the RACROUTEREQUEST=STAT macro. See the RACROUTE MACRO reference <strong>for</strong>further in<strong>for</strong>mation about this feature.August 2003 7 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


• Unnecessary INF<strong>OS</strong>TG DBASE I/O <strong>for</strong> OMVS ProfilesCode introduced by problem #3517 (circa 1996) attempted to address aproblem with the ISHELL administration SETUP script. The script attemptedto insert a new OMVS profile, <strong>and</strong> was followed immediately by aRACROUTE EXTRACT <strong>for</strong> this in<strong>for</strong>mation. This did not work if a clienthad PUSR defined as a resident directory via the GSO INFODIR record. Anintervening REBUILD comm<strong>and</strong> was required to bring the new profile intocore. Problem #3517 changed the RACROUTE EXTRACT processor,ACF9CXTR, to read the database <strong>for</strong> an OMVS USER PROFILE even if thedirectory suggested that the record did not exist. This made the ISHELLUSER SETUP work, but has also caused much un-needed I/O in Websphere,elongating the signon process. Since the negative aspect of problem #3517clearly outweighs the positive today, problem #3517 is being effectivelyreversed by this APAR.• Support <strong>for</strong> GSO STC AttributeSupport to assign logonids to specific started tasks through GSO STC recordshas been added in Release 6.5. Part of the support is to allow <strong>for</strong> the logonidnot to require the STC attribute, if a GSO STC record assigns it.The logonid can have, but does not require, the STC attribute. If the logoniddoes not have the STC attribute it can be used <strong>for</strong> other system accessesincluding inheritance <strong>for</strong> batch jobs submitted by the started task.Additionally, if the start of a started task fails due to a security violation, theACF2 (ACF01XXX) message will be issued.• New Mixed-case Password ExitThis enhancement adds a new input parm at +12 to the New Password Exit(NEWPXIT). The new input parm will be the mixed-case new password(new password exactly as entered by the user).R1 - St<strong>and</strong>ard parameter list:+0 - Address of ACVALD or ACALT parameter list+4 - Address of eight-character new password - upper-cased+8 - Address of logonid record+12 - Address of eight-character new password as entered by the userProcessing notes:• None of the existing parms have changed. Existing new password exitswill work the same as always.• The mixed-case new password will be provided to the New PasswordExit regardless of whether it is indeed mixed-case or not. Someapplications may pass to ACF2 the upper-cased new password, <strong>and</strong>there<strong>for</strong>e the New Password Exit has no way of knowing <strong>for</strong> sure if theAugust 2003 8 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


new password was entered by the user in upper-case or if the callingapplication upper-cased it.• This enhancement does not change in any way the manner by whicheTrust CA-ACF2 processes passwords. eTrust CA-ACF2 will stillupper-case all password data be<strong>for</strong>e using it.This support is limited to situations where it is possible to provide the mixedcasenew password. The following are supported:• TSO logon with new password.• JCL password changes via the //*PASSWORD oldpswd/newpswd card.• Password changes via the ACF comm<strong>and</strong>.• CICS ACFM CP with fix QO40799 (TC6511M) applied.• CICS logon with new password, with the following considerations:Each terminal must be capable of mixed-case data entry. This iscontrolled via the UCTRAN definition within the TYPETERM CICSRDO definition used <strong>for</strong> terminal auto-install processing or via theUCTRAN definition <strong>for</strong> TERMINAL CICS RDO definitions. Inaddition, the signon transaction itself must have UCTRAN(NO) (whichis the default) specified in the PROFILE CICS RDO definitionassociated with it. See the CICS Resource Definition Guide or the CICSIn<strong>for</strong>mation Center <strong>for</strong> additional in<strong>for</strong>mation. Failure to properly setthese CICS options may result in CICS automatically upper-casing allinput data.Consider the method of signon used. The eTrust CA-ACF2 CICSACFAEUSC sample signon program does not upper-case the newpassword, thus the entry case of the new password is preserved. If,however, you are using CICS-provided facilities <strong>for</strong> signon, you have toidentify which you use in your environment <strong>and</strong> consider their impact.For example, it appears that the EXEC CICS SIGNON comm<strong>and</strong>preserves entry case of new password data, but it also appears that theOCO IBM-supplied DFHSNP signon program does not, altering the caseof the new password, <strong>for</strong>cing it to be upper-case. As both functions areIBM controlled <strong>and</strong> are distributed in OCO <strong>for</strong>mat, they are, in theory,susceptible to changes by IBM maintenance or by new IBM productreleases.Consider the impact of any terminal-related changes on yourapplications. Legacy application systems may assume that all inputterminal data is upper-cased <strong>and</strong> application failures <strong>and</strong>, in a worse-casescenario, application corruption <strong>and</strong>/or outages could result if mixed-casedata is introduced. Investigate your installation's current terminal autoinstallconfiguration <strong>and</strong> determine the UCTRAN option that is set <strong>for</strong>auto-installed terminals. Consider also any hardcoded terminaldefinitions that may exist.August 2003 9 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


Section A – InstallationFollow the installation procedures documented in the Release 6.5 eTrustCA-ACF2 <strong>Security</strong> <strong>for</strong> <strong>OS</strong>/<strong>390</strong> <strong>and</strong> z/<strong>OS</strong> Getting Started guide.Installation InstructionsInstallation instructions <strong>for</strong> eTrust CA-ACF2® <strong>Security</strong> <strong>for</strong> CICS can be foundin the eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> CICS Support Guide.eTrust CA-ACF2® <strong>Security</strong> <strong>for</strong> IMS installation instructions can be found inthe eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> IMS Support Guide <strong>and</strong> IMSBatch Support Guide.Installation Changes1. The SMPMCS deck now contains DATA element types replacing'++MAC' element types where appropriate. The new DATA elementtypes include: ++MOD, ++SRC, ++PROC, ++PNL, ++CLIST,++MSG, ++SKL, ++HELP, <strong>and</strong> ++MSGENU. The main impact is thatDATA elements cannot be updated, only replaced.2. If you are installing MAC, the following High Level Assemblermessages can be ignored: ASMA301W, ASMA303W, <strong>and</strong> ASMA435I.Notes regarding eTrust CA-ACF2 Release 6.5 installation processing, JXB2APPAPPLY job:• You can expect to get a return code of four from the JXB2APP job. Youmay see error messages IEW2470E <strong>and</strong> IEW2468E <strong>for</strong> the CAIXJ815 loadmodule; these can be ignored.• You can expect to see IEW2454W warning messages <strong>for</strong> program objectbind processing to the CAI.SMPLTS dataset. These are normal <strong>and</strong> can beignored.Notes regarding eTrust CA-ACF2 Release 6.5 CICS installation processing,CX65APP APPLY job:• You can expect to get a return code of four from the CX65APP job. Youmay also see messages IEC141I <strong>and</strong> IEW2745S; these can be ignored.Important Note <strong>for</strong> IMS UsersAfter completing the eTrust CA-ACF2 Release 6.5 base maintenance you shouldapply PTF TT65658 to refresh the local copies of base processing modules in theeTrust CA-ACF2 Release 6.5 IMS interface. Refer to the IMSLVL member ofthe ACF2IMS.SAMPJCL data set to install this PTF.August 2003 10 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


Important Note <strong>for</strong> eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> DB2 UsersUsers wishing to reinstall eTrust CA-ACF2® <strong>Security</strong> Option <strong>for</strong> DB2 <strong>for</strong> anyreason once eTrust CA-ACF2 Release 6.5 is installed must reinstall eTrustCA-ACF2 <strong>for</strong> DB2, Release 1.1 at the SP06 Service pack level. In addition, userswishing to apply any maintenance to eTrust CA-ACF2 <strong>for</strong> DB2 once eTrustCA-ACF2 Release 6.5 is installed will first need to reinstall eTrustCA-ACF2 <strong>Security</strong> <strong>for</strong> DB2 Release 1.1 at the SP06 Service pack level.Note to Users of EKC, Inc.‘s ETF/A 1.6.0 ProductIf your installation uses EKC, Inc.’s ETF/A product at the V1.6.0 level, beadvised that EKC technical support has written ETF/A APAR LD16037(prerequisite APAR is LD16018) to provide support <strong>for</strong> eTrust CA-ACF2Release 6.5. Please contact your EKC, Inc. technical support representativedirectly <strong>for</strong> further in<strong>for</strong>mation.Section B - Maintenance InstallationThe maintenance contained on this tape updates an existing eTrust CA-ACF2Release 6.5 system to Service pack SP01 status.Installation instructions <strong>for</strong> eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> CICS can be found inthe eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> CICS Support Guide. eTrustCA-ACF2 <strong>Security</strong> <strong>for</strong> IMS installation instructions can be found in the eTrustCA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> IMS Support Guide <strong>and</strong> the IMS BatchSupport Guide.Refer to the $DOC member of ACF2.FIXLIB, (file 30 on this tape) <strong>for</strong>upgrade/maintenance documentation on eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong><strong>OS</strong>/<strong>390</strong>, eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> CICS, <strong>and</strong> eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong>IMS. Refer to CAI.ACF2.SAMPJCL(ACFMAINT) <strong>for</strong> the JCL to unload theACF2.FIXLIB file.An APAR cross-reference file, ACF2.FIXXREF (file 31), is included on the tape.It includes an entry <strong>for</strong> each APAR written against eTrust CA-ACF2 Release 6.5since its inception. Each entry contains the APAR number, the level at which itwas distributed, the modules that it affects, a short description, <strong>and</strong> the originaltest fix number. This file is unloaded in job step FIXXREF of the ACFMAINTprocedure.Important Note <strong>for</strong> IMS UsersAfter completing the eTrust CA-ACF2 Release 6.5 base maintenance you shouldapply PTF TT65658 to refresh the local copies of base processing modules in theeTrust CA-ACF2 Release 6.5 IMS interface. Refer to the IMSLVL member ofthe ACF2IMS.SAMPJCL data set to install this PTF.Section C - CAIRIM <strong>and</strong> LMP KeysAugust 2003 11 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


License Management Program (LMP)eTrust CA-ACF2 licensing is maintained by the CA License ManagementProgram (LMP). LMP provides a st<strong>and</strong>ardized, automated approach to licensemanagement <strong>and</strong> is designed to eliminate the difficulties inherent in tracking theaccurate licensed use of CA products.LMP runs as a component of CAIRIM. CAIRIM must be installed prior toinitializing eTrust CA-ACF2. If CAIRIM is not running, eTrust CA-ACF2issues message ACF79452. If CAIRIM is not started in 30 minutes, eTrustCA-ACF2 issues this message:ACF79457 CPU nnnnnn REQUIRES A LMP KEY TO RUN PROD(X1)eTrust CA-ACF2 MVSYou should already have received an LMP Product Key Certificate. If you do nothave a valid LMP KEY <strong>for</strong> the CPU on which you are running, CA CommonServices <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong> message CAS9180E appears on your systemconsole. Once the appropriate key is entered <strong>and</strong> CAIRIM is restarted, enter thefollowing console comm<strong>and</strong>:F ACF2,LMPCHECKeTrust CA-ACF2 immediately verifies the new key. If it is still not valid,another message is generated to your console.If you have any questions about LMP <strong>and</strong> CAIRIM call the CA LicenseManagement Program Hotline at 1-800-338-6720 in North America (24 hours aday, 7 days a week). Outside of North America, contact your local ComputerAssociates Technical Support Center during local business hours.August 2003 12 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>


END OF PMLAugust 2003 13 eTrust CA-ACF2 <strong>Security</strong> <strong>for</strong> z/<strong>OS</strong> <strong>and</strong> <strong>OS</strong>/<strong>390</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!