Previous Topic: Labeling Catalogs and Critical Data SetsNext Topic: Assigning Security Labels to DB2 Resources


Assign Security Labels to Non-data set Resources

While MLS is still inactive on a system, all non-dataset resources that require MAC protection should be labeled.

To assign a security label to a non-dataset resource, you need the name of the resource that you want to secure. In CA Top Secret these names are referred to as resource names

To assign a security label to a resource, create an MLS data record for it.

This command has the format:

TSS ADD|REMOVE(MLS) RESCLASS(resname)
                    SECLABEL(seclabel)
                    MODE(mode)
Resclass(resname)

Specifies the name of the resource class and the resource name to be protected with a security label. The resclass must be a resource class defined in the RDT record. The resname can be the full resource name or a prefix name and can contain any of the masking characters that are supported in CA Top Secret.

Seclabel(seclabel)

Specifies the alphanumeric-national character name of a security label. The security label must be predefined in the MLS record or it may be one of the system defined security label names.

Range: 1 to 8 bytes

Mode(mode)

Specifies the security mode under which security validation will be performed.

Example

TSS ADD(mls) JESJOBS(submit.mynode.*.user01)
             SECLABEL(usrlbl1)
TSS ADD(mls) OTRAN(payr)
             SECLABEL(labelap)