CA Top Secret provides support for default UID and GID through the OMVSUSR and OMVSGRP control options. Evaluate your security policy to determine whether all users should be given their own UIDs and GIDs. Overuse of the default feature limits your ability to audit access permissions under USS.
Note: OMVSGRP and OMVSUSR are not supported in z/OS 2.1 and above. For more information about UNIQUSER and MODLUSER, see the CA Top Secret Control Options Guide.
Use the following process to define a default UID and GID:
TSS MODIFY(OMVSUSR(acid_name))
TSS MODIFY(OMVSGRP(group_acid))
TSS ADD(‘acid_name’) DFLTGRP(‘group_acid’)
Both methods define a TYPE GROUP ACID.
TSS ADD(acid) NOOMVSDF
If you define the BPX.DEFAULT.USER profile, all users will have access to z/OS UNIX. To limit access, define an OMVS segment with no UID. This prevents unauthorized users from using a UNIX service. If users must have anonymous access (for FTP or other socket use) without using the shell, define the initial program for the default user as /bin/echo.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|