SIT security parameter settings recognized by CA Top Secret are listed on the following pages. Any other settings are not recognized.
Indicates whether to accept the CMDSEC value.
The CMDSEC value is honored for all transactions; corresponds to PCTCMDSEC=HONOR.
The CMDSEC value is overridden for all transactions and SPI security checking is forced; corresponds to PCTCMDSEC=OVERRIDE.
Specifies a prefix that is used to qualify the security role defined in an enterprise bean's deployment descriptor. The prefix is applied to the security role when:
An application invokes the following method:
isCallerInRole()
You can specify a prefix of up to 16 characters. The prefix must not contain a period (.) character. If you specify a prefix that contains lowercase characters, blanks, or punctuation characters, you must enclose it in apostrophes. If the prefix contains an apostrophe, code two successive apostrophes to represent it.
Note: The EJBROLEPRFX parameter is ignored if security role support is not enabled. To enable security role support you must specify SEC=YES and XEJB=YES.
Mixed case is not supported under CA Top Secret r8 and above or Facility sub option EJBRPRFX. However, you have mixed case support if you specify EJBROLEPRFX in the CICS SIT, and set FACMATRX=NO.
Indicates whether to accept the RESSEC value.
The RESSEC value is honored for all transactions.
The RESSEC value is overridden for all transactions and resource security checking is forced.
Note: If FACMATRX=YES, RESSEC is set to OVERRIDE.
Indicates whether CA Top Secret is active for this region.
It is active for this region; corresponds to EXTSEC=YES.
It is inactive; corresponds to EXTSEC=NO.
Indicates whether a user is restricted from signing on multiple times within the designated scope. Valid values include:
(Default) No duplicate checking. This value is forced when SNSCOPE=CICS or SNSCOPE=NONE is found in the SIT during region initialization. This alteration is required so that the SIGNMULTI attribute can be enforced.
Duplicate signons disallowed within CICS region (with exceptions for region acid, DFLTUSER and PLTUSER, as well as for MRO signons). This value, when set, is altered to NONE by CA Top Secret. Enforcement of duplicate signon within a CICS region should be set by using SIGN(S) in the CICS region ACID MASTFAC facility.
Duplicate signons disallowed for CICS regions in the same MVS image. Some anomalies might occur where CA Top Secret successfully signs the user on but the signon is later rejected by CICS due to this setting. So that there is no contradiction between CICS and CA Top Secret enforcement, SIGN(M) should be used on the associated CICS region ACID MASTFAC facility.
Duplicate signons disallowed for CICS regions in the same SYSPLEX. Some anomalies might occur where CA Top Secret successfully signs the user on, but the signon is later rejected by CICS due to this setting. So that there is no contradiction between CICS and CA Top Secret enforcement, SIGN(M) should be used on the associated CICS region ACID MASTFAC facility.
Indicates whether APPC session security can be used.
Uses session security
Session security is not used.
Indicates whether EXEC CICS commands are checked by CA Top Secret.
All SPI commands are checked.
SPI commands are not checked.
SPI commands include both CEMT commands and EXEC CICS SPI commands from an application program.
Indicates whether XDB2 activities are checked.
The DB2ENTRY AND DB2TRANS resource checks are performed under one of the following two conditions:
Checking is not performed by CA Top Secret.
Indicates whether transient data entries are checked by CA Top Secret.
Transient data entries for this region are checked.
Transient data entries for this region are not checked.
Specifies whether support of security roles is enabled.
CICS Support for security roles is enabled:
isCallerInRole()
CICS calls the external security manager to determined whether the userid associated with the transaction is defined in the role specified on the method call.
CICS support for security roles is disabled:
isCallerInRole()
Note: To enable security role support, you must also specify SEC=YES.
Indicates whether File Control entries for the region are checked by CA Top Secret.
File control entries for this region are checked.
File control entries for this region are not checked.
(CTS 3.2 and above) Specifies whether CICS performs security checking for Web Client access to HFS files.
Indicates whether journal entries are checked for this region by CA Top Secret.
Journal control entries for this region are checked.
Journal control entries for this region are not checked.
Indicates whether EXEC‑started transactions for this region are checked by CA Top Secret.
Tranids specified on EXEC CICS START, INQ, SET, DISCARD, and COLLECT STATISTICS commands for this region are checked.
Tranids specified on EXEC CICS START, INQ, SET, DISCARD, and COLLECT STATISTICS commands for this region are not checked.
Indicates whether program entries for this region are checked by CA Top Secret.
Program entries for this region are checked.
Program entries for this region are not checked.
Indicates whether PSB entries for this region are checked by CA Top Secret.
Database PSB entries for this region are checked.
Database PSB entries for this region are not checked.
(CTS 3.2 and above) CICS document templates (DOCTEMPLATE resource definitions).
Indicates whether attached transaction entries for this region are checked by CA Top Secret.
Transaction entries for this region are checked prior to execution.
Transaction entries for this region are not checked prior to execution.
Indicates whether temporary storage entries for this region are checked by CA Top Secret.
Temporary storage keys for this region are checked.
Temporary storage keys for this region are not checked.
Indicates whether surrogate user checking is performed by CA Top Secret.
Performs surrogate user checking, including non‑terminal (background) level security.
Does not perform surrogate user checking.
Note: Except for XAPPC and XUSER, XPARMS are in effect only when RESSEC=YES is specified on the transaction or PCTRESSEC=OVERRIDE is in effect.
The signon transaction should be excluded from CICS SPURGE processing. SPURGE valid transactions are purged from the system by CICS during periods of stress. This is not desirable for signon, since this can lead to abends or overlays, if a signon is purged simultaneously with CA Top Secret returning the user's signon environment.
CESN should be copied from IBM‑supplied group to one capable of maintenance. Alter SPURGE attribute to No.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|