Attach‑time security allows incoming requests to attach to requested transactions. The session must be established. In addition to the link security check, a second check is made on behalf of the signed‑on user or the CICS region ACID, depending on the attach‑security specification.
The level of attach‑time security required for a remote system is specified in the ATTACHSEC parameter (for RDO) or the USERSEC parameter (for RDM), as shown in the following figure.
RDO definition RDM definition
DEFINE DFHTCT TYPE=SYSTEM
CONNECTION(sysidnt) ,SYSIDNT=name
GROUP(groupname) . .
ATTACHSEC({Local| ,USERSEC=\{Local|
Identify| Identify|
Verify| Verify|
Persistent| Persistent|
Mixidpe\} Mixidpe\}
There are five levels of attach‑time security:
Any requests from the remote system are checked only for Link authority. Set this parameter if CA Top Secret is not securing the remote region. LOCAL is the default.
Any requests from the remote system are checked not only for link authority, but also for the user who initiated the request. Set this parameter if CA Top Secret is securing the remote region.
Every attach request requires a user identifier and a user password.
Requires a user identifier and user password with the first attach request for a new user. Any subsequent attach requests for the same user only requires a user identifier. The first attach signs the user on, even if the attach is not authorized to attach the transaction. Set this parameter if CA Top Secret is securing the destination region (LU6.2 only).
Specifies that the signon level for the remote user is determined by parameters sent with the attach request. The possibilities are: no signon, signon with password, signon without password. Set this parameter if CA Top Secret is securing the destination region ACID (LU6.2 only).
Note: You cannot specify VERIFY, PERSISTENT, or MIXIDPE on MRO links. These are LU6.2 (ISC) only.
The ENF 71 function under z/OS enables communication between administrators and applications. Beginning with z/OS 1.11 and CICS 4.1, CICS monitors type 71 RACF ENF signals. CA Top Secret immediately sends an ENF signal to CICS when a security administrator makes the following changes:
When the profile addition or removal occurs and CICS receives a new attach request for a user ID, CICS performs an implicit signon for the user ID and uses the new profile information. Existing tasks for the user continue with the profile that was valid when the task was attached.
Note: CICS is not notified when a user ID expires.
The ENF signal immediately notifies CICS of the change to the user’s security record (overriding any setting specified in the USRDELAY system initialization parameter). CICS can then refresh or remove the user's security record in a remote CICS region.
Example: Monitoring Type 71 RACF ENF Signals
In this example, an administrator issues the following command to suspend USER01 for five days:
TSS ADDTO(USER01) SUSPEND FOR(5)
Issuing the command immediately notifies CICS of the change.
When ATTACHSEC(LOCAL) is specified for a connection, no individual user information is passed to the remote region; only link security is checked when the transaction processes. This setting should not be used for:
The attach‑time parameters IDENTIFY, VERIFY, PERSISTENT, and MIXIDPE provide full remote security. This level of user security processing is the standard CICS security method of propagating the user's security information from one region to another in a CICS MRO or ISC environment. CICS transmits the userid of the signed‑on user along with the remote request. When the remote request arrives in the AOR, CICS retrieves the userid and issues a signon request on behalf of the user.
Note the following information:
Note: To determine if you must allow for this situation, see the CICS Interregion Communication Guide for your appropriate CICS release.
You should code this ACID with a non‑expiring password. The following example shows that no permission is needed just to add the facility with which the SYSID is associated:
TSS CREATE('SYSID') NAME('CICS SYSID ACID')
FACILITY(CICS)
PASSWORD(XXXX,0)
DEPARTMENT(deptacid)
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|