While MLS is still inactive on a system, all non-dataset resources that require MAC protection should be labeled.
To assign a security label to a non-dataset resource, you need the name of the resource that you want to secure. In CA Top Secret these names are referred to as resource names
To assign a security label to a resource, create an MLS data record for it.
This command has the format:
TSS ADD|REMOVE(MLS) RESCLASS(resname)
SECLABEL(seclabel)
MODE(mode)
Specifies the name of the resource class and the resource name to be protected with a security label. The resclass must be a resource class defined in the RDT record. The resname can be the full resource name or a prefix name and can contain any of the masking characters that are supported in CA Top Secret.
Specifies the alphanumeric-national character name of a security label. The security label must be predefined in the MLS record or it may be one of the system defined security label names.
Range: 1 to 8 bytes
Specifies the security mode under which security validation will be performed.
TSS ADD(mls) JESJOBS(submit.mynode.*.user01)
SECLABEL(usrlbl1)
TSS ADD(mls) OTRAN(payr)
SECLABEL(labelap)
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|