When user IDs have an OMVS segment defined, they can issue any of the USS, TCP/IP, or CSM (Communications Storage Manager) commands.
Some USS commands, like UPROCESS, only display processes belonging to the USS UID and GID of a user.
To add OMVS segment to user IDs, see the Security Requirement section in the HELPLIB member for the command.
Example: Help Command
Issue the following Help command to retrieve security requirements information for a specific USS, TCP/IP, or CSM:
HELP UPROCESS
The following sections list SAF authorizations that are required for both the CA SYSVIEW address spaces and for individual user IDs. The SAF authorizations depend on what features and components are implemented at your site.
The JESSPOOL class is used to protect JES spool data from unauthorized access. If the JESSPOOL class is active in your external security product, the SYSLOG and OUTPUT commands make SAF calls in the JESSPOOL class for the resources shown.
jesnode.+MASTER+.SYSLOG.SYSTEM.sysname
jesnode.userid.jobname.jobid.jesdsname.ddname
Access is required to the following FACILITY class resources so you can:
MVSADMIN.LOGR
MVSADMIN.XCF.CFRM
XLSTR.cf_structure_name
CSVAPF.**
This access lets the task run the dynamic install program GSVXINST.
ssid.MQM
BPX.SUPERUSER
The LOGSTRM class is used to secure access to MVS log streams.
log.stream.name
log.stream.name
log.stream.name
The OPERCMDS class is used to secure access to MVS operator commands.
MVS.STOP.STC.**
MVS.START.STC.**
MVS.MODIFY.STC.**
MVS.mvscommand.**
The UNIXPRIV class is used to secure access to Unix System Services (USS) commands.
SUPERUSER.PROCESS.GETPSENT
Note: Use this resource in place of granting the user access to BPX.SUPERUSER in the FACILITY class, or having a default UID of 0. By default, you will only see processes running with the same UID/GID as your user ID.
SUPERUSER.FILESYS
Note: Use this resource in place of granting the user access to BPX.SUPERUSER in the FACILITY class, or having a default UID of 0.
SUPERUSER.PROCESS.KILL
Note: This could be done in place of granting the user access to BPX.SUPERUSER in the FACILITY class, or having a default UID of 0. By default, you will only be able to kill USS processes owned by your UID/GID.
The MQCONN class is used to secure access to MQSeries connections.
ssid.BATCH
The MQQUEUE class is used to secure access to MQSeries queues.
ssid.SYSTEM.COMMAND.**
ssid.SSID.**
The MQCONN class is used to secure access to MQSeries commands.
Resource:
ssid.DISPLAY.**
The SERVAUTH class is used to secure access to TCP/IP stacks.
Note: The VTAM start option, SNAMGMT, must be set to YES, so that the ISTMGCEH subtask will be attached to open the Network Management Interface.
EZB.STACKACCESS.**
EZB.NETSTAT.**
Note: Superuser authority is either a UID of 0 or READ access to the BPX.SUPERUSER entity of the FACILITY class.
IST.NETMGMT.mvsname.SNAMGMT
Represents the z/OS system name.
Note: Superuser authority is either a UID of 0 or READ access to the BPX.SUPERUSER entity of the FACILITY class.
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |