Previous Topic: Remove Administrative AuthoritiesNext Topic: Passwords


Restricted Administrative Authorities

The CASECAUT resource class enables users with no administrative authorities to change certain password-related fields and issue digital certificate, keyring, and token commands for users within their scope.

CASECAUT authorities supplement existing administrative authorities, with the following exceptions:

RACROUTE checks for authorization in the CASECAUT class are issued in addition to (not instead of) the existing ADMIN authority checking. The appropriate CASECAUT RACROUTE access check is issued only when the existing ADMIN authority check fails. The NORESCHK attribute is not honored for the CASECAUT resource class.

Required CASECAUT Authorizations for Changing Password Fields

If given proper access to the entity TSSCMD.USER.cmd field in the CASECAUT resource class, users with no administrative authorities can change certain password-related fields for users within their scope. Access to this entity is granted by an administrator (using a PERMIT command).

The following table shows the authorizations that are needed to change password-related fields.

Note: An access level of UPDATE is required. Always replace cmd with the full command name or * (to apply to all commands)

Field Name

CASECAUT Entity Name

Applicable Commands for cmd Qualifier

ASUSPEND

TSSCMD.USER.cmd.ASUSPEND

REMOVE

KERBVIO

TSSCMD.USER.cmd.KERBVIO

REMOVE

NOPW

TSSCMD.USER.cmd.NOPW

CREATE, ADDTO, or REMOVE

NOPWCHG

TSSCMD.USER.cmd.NOPWCHG

CREATE, ADDTO, or REMOVE

PASSWORD

TSSCMD.USER.cmd.PASSWORD

CREATE, ADDTO, or REPLACE

PASSWORD(newpw)

TSSCMD.USER.cmd.PWADMIN.NO

CREATE, ADDTO, or REPLACE

PASSWORD(newpw)

TSSCMD.USER.cmd.PWADMIN.EXP

CREATE, ADDTO, or REPLACE

PASSWORD(newpw)

TSSCMD.USER.cmd.PWADMIN.INT

CREATE, ADDTO, or REPLACE

PASSWORD(newpw)

TSSCMD.USER.cmd.PWADMIN.ZEROINT

CREATE, ADDTO, or REPLACE

PASSWORD(newpw)

TSSCMD.USER.cmd.PWADMIN.HISTBYP

ADDTO or REPLACE

PASSWORD(newpw)

TSSCMD.USER.cmd.PWADMIN.TS

ADDTO or REPLACE

PHRASE

TSSCMD.USER.cmd.PHRASE

CREATE, ADDTO, or REPLACE

PSUSPEND

TSSCMD.USER.cmd.PSUSPEND

ADDTO or REMOVE

SUSPEND

TSSCMD.USER.cmd.SUSPEND

CREATE, ADDTO, or REMOVE

VSUSPEND

TSSCMD.USER.cmd.VSUSPEND

ADDTO or REMOVE

XSUSPEND

TSSCMD.USER.cmd.XSUSPEND

ADDTO or REMOVE

Example: Allow a User to Change the PASSWORD field for Any User within Scope

This example allows user DCA01 to change the PASSWORD field for any user within scope:

TSS PERMIT(DCA01) CASECAUT(TSSCMD.USER.REPLACE.PASSWORD) ACCESS(UPDATE)

Example: Allow a User to Change All Password-Related Fields for Any User within Scope

This example allows user DCA01 to change all password-related fields for any user within scope:

TSS PERMIT(DCA01) CASECAUT(TSSCMD.USER.REPLACE.*) ACCESS(UPDATE)

Example: Allow a User to Change the PASSWORD Field for Any User within Scope

This example allows user DCA01 to change the PASSWORD field, for any user within scope, to NOPW:

TSS PERMIT(DCA01) CASECAUT(TSSCMD.USER.REPLACE.NOPW) ACCESS(UPDATE)

Example: Allow an SCA User to Change the PASSWORD Field for the MSCA

This example allows SCA user SCA01 to change the PASSWORD field for the MSCA:

TSS PERMIT(SCA01) CASECAUT(TSSCMD.USER.REPLACE.MSCAPW) ACCESS(UPDATE)

Required CASECAUT Authorizations for Issuing Digital Certificate and Keyring Commands

If given proper access to the entity TSSCMD.CERTUSER.function in the CASECAUT resource class, users with no administrative authorities can issue certain digital certificate keyring and token commands for users within their scope. Access to this entity is granted by an administrator (using a PERMIT command).

The following table shows the authorizations that are needed to issue digital certificate and keyring-related commands.

Note: An access level of UPDATE is required. If the command applies to a CERTAUTH ACID, replace the second qualifier, CERTUSER, with CERTAUTH. If the command applies to a CERTSITE ACID, replace CERTUSER with CERTSITE.

Command

CASECAUT Entity Name

ADD

TSSCMD.CERTUSER.ADDTO

CHKCERT

TSSCMD.CERTUSER.CHKCERT

EXPORT

TSSCMD.CERTUSER.EXPORT

GENCERT

TSSCMD.CERTUSER.GENCERT

GENREQ

TSSCMD.CERTUSER.GENREQ

P11TOKEN

TSSCMD.DIGTCRT.P11TOKEN.tokencmd

REKEY

TSSCMD.CERTUSER.REKEY

REMOVE

TSSCMD.CERTUSER.REMOVE

ROLLOVER

TSSCMD.CERTUSER.ROLLOVER

Example: Allow a User to Add a Digital Certificate to Any User within Scope

This example allows user DCA01 to add a digital certificate to any user within scope:

TSS PERMIT(DCA01) CASECAUT(TSSCMD.CERTUSER.ADDTO) ACCESS(UPDATE)

Example: Allow a User to Add a Digital Certificate to the CERTSITE ACID

This example allows user DCA01 to add a digital certificate to the CERTSITE ACID:

TSS PERMIT(DCA01) CASECAUT(TSSCMD.CERTSITE.ADDTO) ACCESS(UPDATE)

Example: Allow a User to Generate a Digital Certificate for Any User within Scope

This example allows user DCA01 to generate a digital certificate for any user within scope:

TSS PERMIT(DCA01) CASECAUT(TSSCMD.CERTUSER.GENCERT) ACCESS(UPDATE)

Example: Allow a User to Add a P11TOKEN

This example allows user DCA01 to add a P11TOKEN:

TSS PERMIT(DCA01) CASECAUT(TSSCMD.DIGTCERT.P11TOKEN.ADDTO) ACCESS(UPDATE)