CA TLMS security intercepts for control functions include label access control, which occurs at data set/volume OPEN. Protection is provided by security options BLPSEC=, NLSEC=, NSLSEC= and FORSEC=. Additional control functions protect panel access for TLTPISPF and command control used by TLTPISPF, batch processing, and TLMSTSO.
Label control consists of four security options; BLPSEC= for controlling the ability to process BLP tapes, NLSEC= and NSLSEC= for controlling No Label (NL) and Nonstandard Label (NSL), respectively, and FORSEC= to control use of foreign volumes.
Any of these four security options may be specified as YES or NO. This activates/deactivates the security intercepts in CA TLMS to perform a security check to see if the caller has access to any of these label types. Calls made to the security interface will indicate whether the label access is for a volume within or outside the range of the VMF. That is, the volume serial is resident or not resident on the VMF.
The information passed to the TLMSXSEC user exit and the system security component are:
CLASS=CATAPE (CLASS must be defined to system security.) ENTITY=xxxRES Volume is resident on the VMF. xxxNORES Volume is not resident on the VMF. xxx is BLP, NL, NSL or FOR ACCESS=READ Volume opened for input UPDATE Volume opened for output
CA TLMS automatically turns on the security intercept for panel control in TLTPISPF when the online global security option, INQACC= is specified as YES. Panel control allows TLTPISPF to restrict access to certain inquiry and update panels that can be displayed online.
User access to a display panel is either ON or OFF, meaning the user either has access to a panel or does not. Panel access only controls the ability to view a panel. Once authorized to access a panel, the user still must have authority to view or update the information on that panel. Inquiry and update authority from an authorized panel is handled through command processing control.
The panel "entities" to which access is controlled through TLTPISPF and the system security component are:
AU01, AUXILIARY MESSAGES : TLPAU01 DL01, VOLUME SERIAL LIST : TLPDL01 DS01, DATA SET SELECTION : TLPDS01 DS02, DATA SET DETAIL : TLPDS02 CT01, DATA SET CATALOG : TLPCT01 MS01, MISC. SELECTION : TLPMS01 OP01, OPTIONS SELECTION : TLPOP01 VL01, VOLUME SELECTION : TLPVL01
The information passed to the TLMSXSEC user exit and the system security component are:
CLASS=PANEL (CLASS must be defined to system security) ENTITY=TLP**** Panel name definition (**** is one or more of the panel names listed above) ACCESS=READ (YES) Panel access is granted NONE (NO) Panel access is restricted
Several program elements inside and outside of CA TLMS use direct command processing to the CA TLMS address space (CTS). These commands can range from displaying date format information to breaking data set and volume chains on the VMF. When security is activated for CA TLMS, command control intercepts are automatically set to allow access checking with the system security interface.
Note: For information on commands and their syntax, see the User Guide.
It is important to understand that command authorization is performed on the user ID, not by program name. For example, TLMSTRS can issue an UPDATE VOLUME SCRATCH DATA SET (UPV 123456, SCRATCH=YES,DSN=(CAI.EXPIRED.TAPE) the same as a user entering commands in TLMSTSO command processor. In both cases, the user running the batch job or entering online commands, once authorized, can issue or cause commands to be issued from any CA TLMS facility.
When defining security rules for those users that will be allowed to issue commands directly and indirectly, ensure that program interfaces supplied for use with CA TLMS are also authorized for any commands they may issue, including the CA TLMS address space.
For security purposes, and to ease the security rule definition process, CA TLMS commands are broken down into the four entity groups maintenance, librarian, update and read. Although each command can be defined as a single entity, the following is a summary of the four command groups. The command entities to which access is controlled through TLMSCMND and the system security component are:
TLMcmd, where cmd is one of the following:
Update volser (CHV=BRKCHN)
Update volser (CLEAR)
Update volser (CHD=dsname,CHV=volser)
Update volser (CLRWRM)
TLLcmd,where cmd is one of the following:
Add message
Delete message
Clean
Certify
Service in or out by volume
Update volser (SCRATCH=YES/NO)
Update volser (CDS=nnn)
Update volser (OWNER=name)
Update the retention schedule
Bypass DSN check:
TLUVMFx, where xcmd is one of the following:
Bypass DSN check when user access is Update
Bypass DSN check when user access is Inquiry
TLUcmd, where cmd is one of the following:
Update volume
Update data set
TLRDV*, where * is one of the following:
Display volume status, data set characteristics
Display volume status and history
Display volume status and maintenance
Display volume status and retention
Display volume list
Display all volume information
TLRD*, where * is one of the following:
Display volume information by DSN
Display data set information for cataloged data set
Display the text of an auxiliary message.
The information passed to the TLMSXSEC user exit and the security system component are:
CLASS=CACMD (CLASS must be defined to system security)
ENTITY=TLM*** Maintenance commands
TLL*** Librarian commands
TLVMFU Bypass DSN security checks for update access
TLVMFR Bypass DSN security checks for inquiry access
TLU*** Update commands not covered by TLM or TLL
TLR*** Read or inquiry commands (*** is specified as
listed above)
ACCESS=YES User has access
NO User does not have access
|
Copyright © 2014 CA.
All rights reserved.
|
|