To secure system signon externally, add an entry to the SRTT for the signon (SGON) resource type.
The applicable resource name for the signon resource type is system-identifier; it matches the value in the SYSTEM ID parameter of the system generation SYSTEM statement. Thus, the name of the resource defined in the external system must match the system identifier.
The following examples for CA TSS and CA ACF2 show the relationships that must exist between the system identifier in system generation and the resource identifier in the external security definition; and between the resource class in the external security definition and the external class in the SRTT entry.
SYSGEN syntax MOD SYSTEM 120 SYSTEM ID IS IDMSD ▲ │ CA TSS for z/OS syntax │ └──┐ ▼ TSS PERMIT(user-identifier) SGO(IDMSD) ▲ │ │ #SECRTT syntax │ │ #SECRTT TYPE=ENTRY, │ X RESTYPE=SGON, │ X EXTCLS='SGO',◄┘ X EXTNAME=(RESNAME)
SYSGEN syntax
MOD SYSTEM 120 SYSTEM ID IS IDMSD
▲
│
CA ACF2 for z/OS syntax │
┌──────────────────────┘
▼
$KEY(IDMSD) TYPE(SGO)◄──────────────────┐
UID(user-identifier) ALLOW │
│
│
#SECRTT syntax │
│
#SECRTT TYPE=ENTRY, │ X
RESTYPE=SGON, │ X
EXTCLS='SGO', ◄──────────┘ X
EXTNAME=(RESNAME)
PassTickets can be used as an alternative to a password.
Note: For more information about PassTickets, see Signon Processing.
To use PassTickets for externally secured signon, add PassTicket definitions to the particular external security system being used. Depending on the external security system in use, these definitions can include:
Determining Applid
The applid specified in the definition of the PassTicket to the external security system is a unique identifier for the IDMS CV system. It is composed of the first VTAM line defined to the system. If no VTAM lines exist, it is composed of the system nodename.
See the following sections for examples of the external security definitions needed to allow PassTicket use.
This CA TSS example shows the external security definitions needed to allow PassTicket use:
TSS ADDTO(RDT) RESCLASS(PTKTDATA) ACLIST(ALL,READ,UPDATE) MAXLEN(37)
TSS ADDTO(IDMSDEPT) PTKTDATA(IRRPTAUTH)
TSS ADDTO(NDT) PSTKAPPL(IDMSSY73) SESSKEY(0123456789ABCDEF) TSS ADDTO(NDT) PSTKAPPL(IDMSSY74) SESSKEY(ABCDEF0123456789)
TSS PERMIT(JOHN_SMITH) PTKTDATA(IRRPTAUTH.IDMSSY73.JOHN_SMITH) ACCESS(READ,UPDATE)
This CA ACF2 example shows the external security definitions needed to allow PassTicket use:
SET PROFILE(PTKTDATA) DIVISION(SSIGNON) INSERT IDMSSY73 SSKEY(0123456789ABCDEF) INSERT IDMSSY74 SSKEY(ABCDEF0123456789) F ACF2,REBUILD(PTK),CLASS(P) END
ACFNRULE KEY(IRRPTAUTH) TYPE(PTK) ADD(IDMSSY73.JOHN_SMITH) UID(JOHN_SMITH) SERVICE(READ,UPDATE) ALLOW) F ACF2,REBUILD(PTK)
This IBM RACF example shows the external security definitions needed to allow PassTicket use:
SETROPTS CLASSACT(PTKTDATA) SETROPTS RACLIST(PTKTDATA) SETROPTS GENERIC(PTKTDATA)
RDEFINE PTKTDATA IDMSSY73 SSIGNON(KEYMASKED(0123456789ABCDEF)) UACC(NONE) RDEFINE PTKTDATA IDMSSY74 SSIGNON(KEYMASKED(ABCDEF0123456789)) UACC(NONE)
RDEFINE PTKTDATA IRRPTAUTH.IDMSSY73.JOHN_SMITH UACC(NONE) PERMIT IRRPTAUTH.IDMSSY73.JOHN_SMITH CLASS(PTKTDATA) ID(JOHN_SMITH) ACCESS(READ,UPDATE) RDEFINE PTKTDATA IRRPTAUTH.IDMSSY74.JOHN_SMITH UACC(NONE) PERMIT IRRPTAUTH.IDMSSY74.JOHN_SMITH CLASS(PTKTDATA) ID(JOHN_SMITH) ACCESS(READ,UPDATE)
SETROPTS RACLIST(PTKTDATA) REFRESH
External signon security checking consists of two phases:
Note: For more information, see Signon Processing.
|
Copyright © 2014 CA.
All rights reserved.
|
|