Previous Topic: Multiple DB2 JDBC Applications

Next Topic: DB2 Database Sizes


Security Definitions for RRS and DB2

The following variables are used in the examples:

ssnm

Is your DB2 subsystem name.

uidname

Is the CA ACF2 specific user key.

userid

Is your normal user ID.

Example: CA ACF2 for z/OS

ACF
SET RESOURCE(SAF)
COMPILE
$KEY(ssnm.BATCH) TYPE(SAF)
UID(uidname) ALLOW
STORE
COMPILE
$KEY(ssnm.RRSAF) TYPE(SAF)
UID(uidname) ALLOW
STORE
END

Note: The blank lines are used to terminate the compile of the rule.

To action the new rules, use the following operator command:

F ACF2,REBUILD(SAF)

Example: CA Top Secret for z/OS

TSS ADD(ALL) DB2(DSNR.ssnm.BATCH)
TSS ADD(ALL) DB2(DSNR.ssnm.RRSAF)
TSS PER(userid) DB2(DSNR.ssnm.BATCH)
TSS PER(userid) DB2(DSNR.ssnm.RRSAF)

Example: RACF

RDEFINE DSNR(ssnm.BATCH) UACC(NONE)
RDEFINE DSNR(ssnm.RRSAF) UACC(NONE)
PERMIT ssnm.BATCH CLASS(DSNR) ID(userid) ACCESS(READ)
PERMIT ssnm.RRSAF CLASS(DSNR) ID(userid) ACCESS(READ)