Implementing NMSAF

To implement the NMSAF security solution with user groups and modeling enabled, you must perform the following tasks:

  1. Defining Your User Groups
  2. Modeling Your User Groups
  3. Enabling NMSAF

Note: If your UAMS data set is empty, you must log on with the INSTALL user ID before you perform these tasks. For more information, see Installation Guide.

Defining Your User Groups

To define your user groups

  1. Define a set of logical user groups. Each group will have specific authority needs in your region. As well as the default user groups, there is also a special group for background user IDs.

    Note: You must manually define users with significant privileges using UAMS.

  2. For each group, create a UAMS GROUP user definition with the appropriate set of privileges. These are the only comprehensive UAMS definitions that you must create.

    The following default groups are created automatically when a region starts for the first time:

    1. Enter CMD from the primary menu to display the Command Entry panel.
    2. Enter $NMUAINI at the command prompt (===>).

Modeling Your User Groups

To model your user groups

  1. For each defined GROUP user, create a single model user ID.

    The following default MODEL definitions are created automatically when a region starts for the first time:

  2. Using your external security package, create resource names for each defined group. These must use the same resource class name as the SXCTL RCLASS setting (default FACILITY); for example:
  3. Issue commands to define and activate the resources in your external security system. Give PERMIT privileges with (at least) READ access to the appropriate resource, to all users that will access your region.
  4. Set up the SXCTL file with the following statements:
    MODEL LIST
    MODELGROUP   resource.name.1   model1
    MODELGROUP   resource.name.2   model2
    MODELGROUP   resource.name.3   model3
    MODELGROUP   resource.name.4   model4

    Note: You must list the resource names in the order that you want them to be tested.

    If you want to allow a generic logon for any other users, add an additional line:

    MODELGROUP   *   dfltmodel
    

More information:

External Security Definitions for Modeled Users

User ID Modeling

Enabling NMSAF

To enable the NMSAF security solution

  1. Set the JCL parameter SEC to SEC=NMSAF.

    You can set SEC=NMSAF either during initial implementation of your product, or later.

    When you set SEC=NMSAF, you activate the NMSAF partial security exit, and so enable the NMSAF security solution.

    If you require other components of the NMSAF security solution, you must activate them separately.

    Use the procedures described in Customizing the SXCTL Parameter File and Additional Security Exits in this chapter.

    Note: For a full description of the JCL parameter SEC, see the Reference Guide.

    Note: If your Security product is CA Top Secret, you must create a region control definition for signon.

  2. Restart your region (to allow the security exit to pick up the definitions).

Remote Background User IDs and NMSAF

When regions are linked, a remote region's background user (nnnnBSYS) may need to log on to the local region. To define the remote background user ID to the local region, perform the following tasks:

Signon and Signoff with CA Top Secret

External security includes security for signon and signoff. The CA Top Secret security administrator must create a region control ACID, FACILITY and Started Task definition for the online STC (NETMASTR).

To create this definition

  1. Create a region control ACID using the following commands:
    TSS CRE(netmacid) NAME('region_acid NETMASTR') DEPT(netmdept) PASS(NOPW,0) FAC(STC,NETMASTR) MASTFAC(NETMASTR) NOVOLCHK NORESCHK NOLCFCHK NODSNCHK NOSUBCHK
    
  2. Create a NETMASTR FACILITY by placing the following statements into the CA Top Secret startup parameter file member:
    FAC(user15=NAME=NETMASTR)
    FAC(NETMASTR=NOABEND,ASUBM)
    FAC(NETMASTR=INSTDATA,KEY=8,LCFCMD,LOCKTIME=0,NOLUMSG)
    FAC(NETMASTR=MULTIUSER,PGM=NM0,NORNDPW,RES,SIGN(M))
    FAC(NETMASTR=SHRPRF,NOSTMSG,NOTSOC,WARNPW,NOXDEF)
  3. Define the NETMASTR STC to the CA Top Secret STC Table using the following command:
    TSS ADD(STC)  PROCNAME(NETMASTR)  ACID(netmacid)
    
  4. For any region control ACID to be used to sign on, authorize it to the NETMASTR FACILITY using the following command:
    TSS ADD(user1) IBMFAC(NETMASTR)
    


Copyright © 2010 CA. All rights reserved.