Controlling Access Using an External Security Package

Your external security package can provide resource-level security if it supports SAF. It can provide security on its own or in conjunction with NPF.

SAF calls to your external security package are used to access permissions for user's requests to menus, resources, and commands. This is enabled when $RMSXS-prefixed member is specified in the NPF Resource List Member field of a UAMS definition.

The following diagram shows the relationship between UAMS and SAF within an external security package. The $RMSXS-prefixed member can either be empty (as shown in the diagram) or contain NPF statements. Sample members are listed in the table in Sample NPF Members.

The diagram shows a UAMS record using the $RMSXSAF member.

The following NPF members (with names prefixed by $RMSXS) indicate that an external security package is to be used:

Sample Security Profiles

Sample security profiles are provided for each of the supported external security packages in the following libraries:

Note: On z/VM systems, these profiles are on the vmid 293 G-disk.

Each library includes the following security profiles:

Defining Security Profiles

To define the appropriate security profiles to an external security package, complete these steps:

  1. Copy the required security member to the security PDS (which is the first library in the COMMANDS concatenation of libraries).
  2. If necessary, modify the members to suit your requirements.
  3. Add a valid job card to run the batch job.
  4. When the job has completed successfully, enter a $RMSXS-prefixed member in the NPF Resource List Member field of your user's group or user ID definition, to indicate that an external security package is required to control security.

The security requirements for the sample groups—$RMADMIN, $RMOPER, $RMNOPER, and $RMMON—are now defined to your external security package and will apply to users attached to these groups.

More information:

Securing Data Set Members

Modifying Security Members

Modifying Security Members

The supplied security members define each group's access to functions and resources. These security members can be modified to suit your own security requirements. Use the syntax specified in the following sections to specify your own requirements for access to menu options, the knowledge base, system images, Automation Services commands, system commands, and product commands.

Controlling Access to Menu Options

To control access to menu options, specify:

$RMMENU.menu-id.option-code

Note: The asterisk (*) represents null, or one or more characters. Two asterisks (**) represent any suffix. This may not apply to your security system, in which case, you must use the equivalent wildcard character that does apply.

Controlling Access to the Knowledge Base

The knowledge base contains definitions of Automation Services components. To control access to knowledge base definitions, specify:

$RMDB.system-image-name.system-image-version.class-number.
definition-name.action-type

Controlling Access to System Images

You can control which functions a user can perform on a system image. To control access to system image resources, specify:

$RMSYS.system-image-name.system-image-version

Controlling Access to Automation Services Commands

You can control whether a user can issue an Automation Services command on an Automation Services component. To control the use of these commands, specify:

$RMCMD.system-image-name.system-image-version.
class-number.component-name.as-command-name

Controlling Access to System Commands

To control the use of system commands, specify:

$RMSYCMD.system-command-name.operand-1.operand-2operand-n

Controlling Access to Product Commands

To control the use of product commands, specify:

$RMNMCMD.product-command-name

When you issue a command from the OCS window or command entry panel, you issue the command under the control of your command authority level and the external security profile of the region. You do not normally issue the command under the control of your own security profile.

If you want to issue a command under the control of your own security profile, replace the command with an NCL procedure.

Note: This does not affect system commands that are already controlled by SAF.

More information:

Product Commands from the OCS Panel or Command Entry Panel

Controlling Access to Customizer Parameter Groups

To control the type of access to Customizer parameter groups, specify:

$RMICS.action.parameter-group-name


Copyright © 2010 CA. All rights reserved.