Previous Topic: Implementing SmartTrace Security

Next Topic: Implementing Resource-Level Security


Defining NETMSTR.PKTTRACE.region

This section contains examples that show how to define the NETMSTR.PKTTRACE.region resource.

Details are given for the three most common external security systems (CA ACF2, CA Top Secret, and IBM RACF).

CA Top Secret

To set up definitions to allow access to SmartTrace in your region with ACB NMTEST, issue the following commands:

TSS ADD(dept) IBMFAC(NETMSTR)
TSS PERMIT(USER1) IBMFAC(NETMSTR.PKTTRACE.*) ACCESS(NONE)  

To allow user USER1 to access SmartTrace data, issue the following command:

TSS PERMIT(USER1) IBMFAC(NETMSTR.PKTTRACE.NMTEST) ACCESS(CONTROL)

CA ACF2

To set up definitions to allow access to SmartTrace in your region with ACB NMTEST, issue the following commands:

[ACF]
SET RESOURCE(FAC)
COMPILE *
$KEY(NETMSTR.PKTTRACE.*) TYPE(FAC)

To allow user USER1 to access SmartTrace data, issue the following command:

$KEY(NETMSTR.PKTTRACE.NMTEST) TYPE(FAC) USER1(USER1) READ(ALLOW)
STORE
[END]

RACF

To set up definitions to allow access to SmartTrace in your region with ACB NMTEST, issue the following commands:

RDEFINE FACILITY NETMSTR.PKTTRACE.* UACC(NONE)
RDEFINE FACILITY NETMSTR.PKTTRACE.NMTEST UACC(NONE)
SETROPTS RACLIST(FACILITY) REFRESH

To allow user USER1 to access SmartTrace data, issue the following command:

PERMIT NETMSTR.PKTTRACE.NMTEST CLASS(FACILITY) ID(USER1) ACCESS(READ)