Important! The following information is not intended to replace nor supersede any information in the CA ACF2 and CA Top Secret documentation for the version being executed. The samples are not intended to display all features of the external security product. The specific rules provided are examples and are not intended as guidelines for establishing a secured environment.
CA ACF2 Example
See the CA ACF2 documentation for the appropriate syntax for the version installed at your site.
SET RESOURCE(CAC) $KEY($ISIGNON) TYPE(CAC) UID(userid) ALLOW $KEY(DBSIGNON) TYPE(CAC) UID(userid) ALLOW $KEY(DDSIGNON) TYPE(CAC) UID(userid) ALLOW $KEY(IPSIGNON) TYPE(CAC) UID(userid) ALLOW
CA Top Secret z/OS and z/VSE Example
For CA Ideal, users must be authorized for access to CACMD(spSIGNON) where sp is the two-character SECPRFX assigned in IDOPTS. See the CA Top Secret documentation for the appropriate syntax for the version installed at your site.
TSS CREATE(DEVL) TYPE(PROFILE) DEPT(DEVELOP)
NAME('DEVELOPMENT DEPARTMENT AUTHORITY')
TSS ADD(DEVELOP) CACMD(DBSIGNON)
TSS ADD(DEVELOP) CACMD(DDSIGNON)
TSS ADD(DEVELOP) CACMD(IDSIGNON)
TSS ADD(DEVELOP) CACMD(IPSIGNON)
TSS PER(DEVL) CACMD(DBSIGNON)
TSS PER(DEVL) CACMD(DDSIGNON)
TSS PER(DEVL) CACMD(IDSIGNON)
TSS PER(DEVL) CACMD(IPSIGNON)
TSS CRE(USERA) TYPE(USER) DEPT(DEVELOP)
NAME('A USER') PROFILE(DEVL) PASSWORD(USRPASS,30,EXPIRED)
FACILITY(CICS)
|
Copyright © 2014 CA.
All rights reserved.
|
|