Previous Topic: Import the Policy Store Data DefinitionsNext Topic: Configure a Connection from the Policy Server to CA LDAP Server for z/OS


CA LDAP Server for z/OS

This section contains the following topics:

CA LDAP Server for z/OS Overview

CA Top Secret r12 (TSS) Backend Security Option

CA LDAP Server r15 for z/OS (RACF) Backend Security Option

CA LDAP Server r15 for z/OS (ACF2) Backend Security Option

CA LDAP Server for z/OS Overview

You can configure a CA LDAP Server for z/OS as a user store by configuring a connection from the Policy Server to the LDAP Server. How you configure the connection from the Policy Server to the LDAP Server depends on the backend option that you are using to secure the LDAP Server:

an illustration describing how backend security is provided.

CA supports the following backend security options for CA LDAP Server:

Become familiar with the objectclass hierarchy for these backend security options before configuring the connection from the Policy Server to the LDAP Server. Also, add the backend-related objectclasses to the Policy Server registries in the LDAP namespace.

Note: z/OS is an IBM operating system for mainframe computers.

CA Top Secret r12 (TSS) Backend Security Option

When you are using TSS to secure the CA LDAP Server for z/OS, complete the following steps before configuring the connection from the Policy Server to the CA LDAP Server:

  1. Become familiar with the TSS objectclass hierarchy.
  2. Add the TSS objectclasses to the Policy Server registries in the LDAP namespace.
TSS Objectclass Hierarchy

The following diagram shows the hierarchy of objectclass entries in the CA Top Secret Directory Information Tree (DIT). Below the diagram is a description of each objectclass.

Graphic showing the TSS objectclass hierarchy

Objectclass host

Object class used to start access to the objectclass hierarchy for a CA Top Secret database.

Objectclass tsssysinfo

Object class used to create branches in the objectclass hierarchy below the host.

Objectclass tssadmingrp

Object class used to create branches in the objectclass hierarchy below the host.

Values:

Objectclass tssacid

Object class used to access the ACID record fields of all user types.

Objectclass tssacidgrp

Object class used to create the branches in the objectclass hierarchy below an acid.

Configure Policy Server Registry Entries for TSS

The CA LDAP Server for z/OS contains different object classes than other LDAP servers. Before configuring a connection from the Policy Server to the CA LDAP Server, add the TSS objectclasses to certain Policy Server registry entries in the LDAP namespace. Substitute the replacement values for the default values of the following Policy Server registry entries:

registry_entry_home

Specifies the following registry entry location:

HKEY_LOCAL_MACHINE\SOFTWARE\Netegrity\SiteMinder\CurrentVersion\Ds.

default_value

Specifies the default value of the registry entry.

replacement_value

Specifies a new value containing the TSS objectclasses for the registry entry.

Add the following TSS object classes to this registry entry:

TSS Objectclass

Registry Key Type

Data

eTTSSAcidName

REG_DWORD

0x00000001(1)

tssacid

REG_DWORD

0x00000001(1)

tssacidgrp

REG_DWORD

0x00000002(2)

tssadmingrp

REG_DWORD

0x00000003(3)

Note: Some LDAP queries that the Policy Server issues (such as a full list of users) can take up to 60 seconds to complete. Under these conditions most of the queries from the Policy Server-side timeout. To improve connectivity, you can adjust this registry key entry as follows:

[HKEY_LOCAL_MACHINE\SOFTWARE\Netegrity\SiteMinder\CurrentVersion\Debug]
LDAPPingTimeout = 300; REG_DWORD