Previous Topic: Misuse of CA Top SecretNext Topic: Security Definitions


Control Options

Control options let selected operators and administrators specify how CA Top Secret controls security. Control options:

Depending on your environment, the following control options with the specified operands can cause security breaches:

AUTOERASE(NO)

Does not erase all residual information on the DASD volume.

AUTH

Changes the authorization algorithm and might impact access (which can be granted or denied).

BACKUP(OFF)

Discontinues automatic backup of the Security File. Backup is also unavailable if the BACKUP DD statement is missing from the CA Top Secret started task procedure.

BYPASS

Allows selected or all jobs/users to bypass security; only use in an emergency.

DOWN

Affects security processing if CA Top Secret becomes inactive.

DRC(nnn,NOVIOL)

Indicates a violation but does not treat the event as a fatal violation. It flags the event but does not FAIL the user.

DUMP

Displays CA Top Secret data areas.

EXIT(OFF)

Deactivates the installation exit.

FACILITY

Controls separate facilities and also displays status. The FACILITY suboptions are:

MODE(mode)

Sets the mode.

LOG(NONE)

Deactivates logging. Violations are always logged in FAIL mode.

INACT

Prohibits initiation/signon.

SIGN(M)

Allows multiple logons with the same ACID for the specified facility.

LOCKTIME = 0

Deactivates terminal locking.

DEFACID(acid)

Controls default ACID assignment.

NOWARNPW

Password violations are not fatal in WARN mode (except for administrators).

NOAUDIT

Deactivates facility‑wide auditing.

HPBPW

Allows expired or changed passwords to be used for limited time in batch.

INACTIVE

Sets a threshold for how long an ACID connected to an expired password can be used before it is suspended.

INSTDATA(0)

Resets global site installation data area to zero in CSA.

JES(NOVERIFY)

Indicates that the JES Early Password Verification feature is not in effect (USER and PASSWORD are required on the jobcard).

LOG(NONE)

Deactivates extra SMF and Audit/Tracking File logging (violations and audited events are always written to the Audit/Tracking File).

LOG(SEC9)

Routes violation messages to the security console using route code 9.

LOG(MSG)

Displays violation messages for batch jobs, started tasks, or online.

MLACTIVE(NO)

Deactivates Multilevel Security (MLS).

MLFSOBJ(NO)

Deactivates the requirement for security labels for UNIX directories and files.

MLMODE

Changes MLS security mode and can lessen or destroy security.

MLNAME(NO)

Allows user to view data set names that were hidden from them.

MLSLBLRQ(NO)

Specifies that security labels are not required for all users, data sets, and resources in an MLS environment.

MLSPCOBJ(NO)

Deactivates the requirement for security labels for IPC objects.

MLWRITE(YES)

Allows the write-down of data in an MLS environment.

MODE

Changes mode globally and can lessen or destroy security.

MSUSPEND(NO)

Allows a user to make an unlimited number of guesses to determine the MSCA password.

NEWPW(NO)

Deactivates most new password rules, except the MIN= and MINDAYS= suboptions.

OPTIONS(NO)

Allows user to indicate which APARS apply from previous releases of CA Top Secret.

PDSPROT(OFF)

Disables the PDS member level protection for all data sets.

PTHRESH(0)

Allows unlimited access attempts at guessing user passwords.

RECOVER(OFF)

Deactivates recording of changes to the Recovery File. If the RECFILE DD statement is missing recovery is not in effect.

RPW(RESET)

Removes all password prefixes currently in the restricted password list if NEWPW(RS) is in effect.

TAPE(OFF)

Deactivates built‑in tape security. Only specify when using external tape management packages such as CA‑1®.

TEMPDS(NO)

Indicates that temporary data sets are not protected and cannot be audited.

TIMER

Controls frequency at which logging buffers are examined and data written to the Audit/Tracking File. If the frequency is too high, data might be lost.

VTHRESH(0)

Deactivates violation threshold controls.