

Implementing Security for APPC z/OS › Implementing APPC Security
Implementing APPC Security
There are five basic steps to secure APPC conversations:
- Review your resources and determine what degree of security you need.
- Secure the ASCH, ASCHINT, and APPC started tasks and permit them to the APPC facility for minimal security.
- Specify which LUs can establish sessions by:
- Adding the appropriate parameters to the VTAM APPL statement,
- Defining remote and partner LUs to the CA Top Secret APPCLU record, and
- Identifying which sessions will be used with APPC. The use of the APPCPORT and APPLICATION parameters will help in defining these sessions.
- Determine how TP profile and side‑information data sets will be maintained (for example, with or without database tokens).
- Secure individual user access to APPC resources by adding new authorization restrictions to the ACID user and profile records.
The information derived from Step 1 will determine what resources you will need to secure, and which of the remaining steps you will need to take.
Copyright © 2013 CA Technologies.
All rights reserved.
 
|
|