Previous Topic: TLMSUTAB (TLTPISPF Table) OptionsNext Topic: CA ACF2 Security Setup


Control Functions

CA TLMS security intercepts for control functions include label access control, which occurs at data set/volume OPEN. Protection is provided by security options BLPSEC=, NLSEC=, NSLSEC= and FORSEC=. Additional control functions protect panel access for TLTPISPF and command control used by TLTPISPF, batch processing, and TLMSTSO.

Label Control Function

Label control consists of four security options; BLPSEC= for controlling the ability to process BLP tapes, NLSEC= and NSLSEC= for controlling No Label (NL) and Nonstandard Label (NSL), respectively, and FORSEC= to control use of foreign volumes.

Any of these four security options may be specified as YES or NO. This activates/deactivates the security intercepts in CA TLMS to perform a security check to see if the caller has access to any of these label types. Calls made to the security interface will indicate whether the label access is for a volume within or outside the range of the VMF. That is, the volume serial is resident or not resident on the VMF.

The information passed to the TLMSXSEC user exit and the system security component are:

CLASS=CATAPE      (CLASS must be defined to system security.)
ENTITY=xxxRES     Volume is resident on the VMF.
       xxxNORES   Volume is not resident on the VMF.
                     xxx is BLP, NL, NSL or FOR
ACCESS=READ       Volume opened for input
       UPDATE     Volume opened for output

Panel Control for TLTPISPF

CA TLMS automatically turns on the security intercept for panel control in TLTPISPF when the online global security option, INQACC= is specified as YES. Panel control allows TLTPISPF to restrict access to certain inquiry and update panels that can be displayed online.

User access to a display panel is either ON or OFF, meaning the user either has access to a panel or does not. Panel access only controls the ability to view a panel. Once authorized to access a panel, the user still must have authority to view or update the information on that panel. Inquiry and update authority from an authorized panel is handled through command processing control.

The panel "entities" to which access is controlled through TLTPISPF and the system security component are:

AU01, AUXILIARY MESSAGES : TLPAU01
DL01, VOLUME SERIAL LIST : TLPDL01
DS01, DATA SET SELECTION : TLPDS01
DS02, DATA SET DETAIL    : TLPDS02
CT01, DATA SET CATALOG   : TLPCT01
MS01, MISC. SELECTION    : TLPMS01
OP01, OPTIONS SELECTION  : TLPOP01
VL01, VOLUME SELECTION   : TLPVL01

The information passed to the TLMSXSEC user exit and the system security component are:

CLASS=PANEL       (CLASS must be defined to system security)
ENTITY=TLP****    Panel name definition (**** is one or more of the panel
                  names listed above)
ACCESS=READ (YES) Panel access is granted
       NONE (NO)  Panel access is restricted

Command Processing Control

Several program elements inside and outside of CA TLMS use direct command processing to the CA TLMS address space (CTS). These commands can range from displaying date format information to breaking data set and volume chains on the VMF. When security is activated for CA TLMS, command control intercepts are automatically set to allow access checking with the system security interface.

Note: For information on commands and their syntax, see the User Guide.

It is important to understand that command authorization is performed on the user ID, not by program name. For example, TLMSTRS can issue an UPDATE VOLUME SCRATCH DATA SET (UPV 123456, SCRATCH=YES,DSN=(CAI.EXPIRED.TAPE) the same as a user entering commands in TLMSTSO command processor. In both cases, the user running the batch job or entering online commands, once authorized, can issue or cause commands to be issued from any CA TLMS facility.

When defining security rules for those users that will be allowed to issue commands directly and indirectly, ensure that program interfaces supplied for use with CA TLMS are also authorized for any commands they may issue, including the CA TLMS address space.

For security purposes, and to ease the security rule definition process, CA TLMS commands are broken down into the four entity groups maintenance, librarian, update and read. Although each command can be defined as a single entity, the following is a summary of the four command groups. The command entities to which access is controlled through TLMSCMND and the system security component are:

Maintenance Commands

TLMcmd, where cmd is one of the following:

BRK

Update volser (CHV=BRKCHN)

CLR

Update volser (CLEAR)

CHN

Update volser (CHD=dsname,CHV=volser)

CLW

Update volser (CLRWRM)

Librarian Commands

TLLcmd,where cmd is one of the following:

AMA

Add message

AMD

Delete message

CLN

Clean

CER

Certify

SRV

Service in or out by volume

SCR

Update volser (SCRATCH=YES/NO)

CDS

Update volser (CDS=nnn)

OWN

Update volser (OWNER=name)

RTN

Update the retention schedule

Bypass DSN check:

TLUVMFx, where xcmd is one of the following:

U

Bypass DSN check when user access is Update

R

Bypass DSN check when user access is Inquiry

Update Commands

TLUcmd, where cmd is one of the following:

UPV

Update volume

UPD

Update data set

Read (Display) Commands

TLRDV*, where * is one of the following:

D

Display volume status, data set characteristics

H

Display volume status and history

M

Display volume status and maintenance

R

Display volume status and retention

L

Display volume list

A

Display all volume information

TLRD*, where * is one of the following:

N

Display volume information by DSN

C

Display data set information for cataloged data set

M

Display the text of an auxiliary message.

The information passed to the TLMSXSEC user exit and the security system component are:

CLASS=CACMD      (CLASS must be defined to system security)
ENTITY=TLM***    Maintenance commands
       TLL***    Librarian commands
       TLVMFU    Bypass DSN security checks for update access 
       TLVMFR    Bypass DSN security checks for inquiry access
       TLU***    Update commands not covered by TLM or TLL
       TLR***    Read or inquiry commands (*** is specified as
                 listed above)
ACCESS=YES       User has access
       NO        User does not have access