One of the key issues that a security administrator must resolve during the implementation of CA Top Secret is the selection of a security mode for CICS. CA Top Secret security for CICS can be implemented in such a manner that existing CICS security or CA Top Secret security is in effect.
Four modes of operation are supported for a CICS environment; DORMANT, WARN, IMPLEMENT, and FAIL. Modes are assigned at five different levels:
The default for the entire CA Top Secret community. For example:
MODE(WARN)
Affects a particular facility within the community. For example:
FACILITY(CICS=MODE=IMPL)
Affects a particular group of users attached to the profile. For example:
TSS PERMIT(PROF01) MODE(IMPL)
Affects a particular user within the community.
TSS PERMIT(USER01) MODE(FAIL)
Forces a particular resource authorization to be processed in FAIL mode. For example:
TSS PERMIT(USER01) TERMINAL(L048T29)
ACTION(FAIL)
Note: The global level is implemented via the MODE control option, or on a facility level via the MODE= suboption of the FACILITY control option. The profile, user and resource levels are implemented via the PERMIT function of the TSS command.
How modes for users and resources defined to CA Top Secret are administered:
No security checking is performed.
If the user is permitted access, security checking is performed by CA Top Secret only. If the user is not permitted access to the resource, a warning message is issued to the user.
Security checking is performed by CA Top Secret.
Security checking is performed by CA Top Secret.
Also note that:
How modes for users defined to CA Top Secret and resources not defined to CA Top Secret are administered:
No security checking is performed.
No security checking is performed. If default protection is specified, a warning message is issued to the user.
No security checking is performed. If default protection is specified, security checking is performed by CA Top Secret only. The user fails because the resource is undefined and therefore, not authorized for access.
If default protection is specified, security checking is performed by CA Top Secret only. The user fails because the resource is undefined and, therefore, not authorized for access.
In addition to the information contained in the previous table, also note that:
The product provides modes of operation for protection of transactions through the Limited Command Facility (LCF). Inclusive LCF lists are defined by the CA Top Secret TRANS function parameter. Exclusive LCF lists are defined by the CA Top Secret XTRANS function parameter.
Note: Transactions that are defined as OTRAN transactions override LCF transactions and are protected by the modes for defined users and resources or modes for defined users and undefined resources. For a complete explanation of LCF protection, see the CA Top Secret User Guide.
The product protects LCF lists as follows:
Provides no security.
Performs security checking if the user has a TRANS LCF list for the facility, and the transaction ID that is accessed is found in that list.
Provides no security.
Performs security checking if the user specifies an XTRANS LCF list, and the transaction that is accessed is not found in the list for the facility.
Fails the user if the user is defined to CA Top Secret and the transaction that is accessed is found in the XTRANS LCF list.
Example: Assign an Inclusive List to a User
This example gives a user an inclusive list (a list of transactions that the user is allowed to use) for facility CICSPROD:
TSS ADDTO(acid) TRANSACTIONS(CICSPROD,(PAYT,MAIL,PAYP))
Example: Assign an Exclusive List to a User
This example gives a user an exclusive list (a list of transactions that the user is not allowed to use) for facility CICSPROD:
TSS ADDTO(acid) XTRANS(CICSPROD,(PAYT,MAIL,PAYP))
Note: When the NOXDEF suboption is specified on the facility for users defined to CA Top Secret without TRANS or XTRANS lists defined, security checking is performed by CICS only in DORM and WARN modes. Access to the requested transaction is allowed in IMPLEMENT and FAIL modes only.
When the XDEF suboption is specified on the facility for users defined to CA Top Secret without TRANS or XTRANS lists defined, security checking is performed by CICS only in DORM and WARN modes. Access to the requested transaction is allowed. In IMPLEMENT and FAIL modes, CA Top Secret performs security checking, and access to the transaction is denied.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|