Previous Topic: CA Top Secret Data Set Selection Profiles

Next Topic: IBM Security Server RACF Commands

CA Top Secret Resource Profiles

The following profiles can be used as either GLOBAL or LOCAL resource-level profiles. GLOBAL resource profiles are defined by omitting the BES subsystem number following the BES prefix.

Command Protection Profiles:

TSS ADDTO(department)  OPERCMDS(BESn.command_name)
TSS PERMIT(besacid)    OPERCMDS(BESn.command_name) ACCESS(READ)
TSS PERMIT(useracid)   OPERCMDS(BESn.command_name) ACCESS(READ)
TSS PERMIT(useracid)   OPERCMDS(BESn.command_name) ACCESS(NONE)
Application Management Protection Profiles:
TSS ADDTO(department)  CA@BES(BESn.CAEKMAPI) 
TSS PERMIT(besacid)    CA@BES(BESn.CAEKMAPI) ACCESS(READ) 
TSS PERMIT(useracid)   CA@BES(BESn.CAEKMAPI) ACCESS(NONE)

Key Protection-Digital Certificates:

TSS ADDTO(department)  CA@BES(BESn.KEYCERT.certificate_name)
TSS PERMIT(besacid)    CA@BES(BESn.KEYCERT.certificate_name) ACCESS(READ)
TSS PERMIT(useracid)   CA@BES(BESn.KEYCERT.certificate_name) ACCESS(READ)
TSS PERMIT(useracid)   CA@BES(BESn.KEYCERT.certificate_name) ACCESS(NONE)

Key Protection-Code Books:

TSS ADDTO(department)  CA@BES(BESn.KEYCODE.codebook_name)
TSS PERMIT(besacid)    CA@BES(BESn.KEYCODE.codebook_name) ACCESS(READ)
TSS PERMIT(useracid)   CA@BES(BESn.KEYCERT.codebook_name) CCESS(READ)
TSS PERMIT(useracid)   CA@BES(BESn.KEYCERT.codebook_name) ACCESS(NONE)

Key Protection-Symmetric Keys Books:

TSS ADDTO(department)  CA@BES(BESn.KEYSYMM.symmetric_key_name)
TSS PERMIT(besacid)    CA@BES(BESn.KEYSYMM.symmetric_key_name) ACCESS(READ)
TSS PERMIT(useracid)   CA@BES(BESn.KEYSYMM.symmeetric_key_name) ACCESS(NONE)

Utility Protection Profiles:

TSS ADDTO(department)  CA@BES(BESn.UTILITY.TBEKMUTL|TBESHOW)
TSS PERMIT(besacid)    CA@BES(BESn.UTILITY.TBEKMUTL|TBESHOW) ACCESS(READ)
TSS PERMIT(useracid)   CA@BES(BESn.UTILITY.TBEKMUTL|TBESHOW) ACCESS(NONE)