CA Top Secret secures online transactions:
The OTRAN resource class allows transactions-which are ordinarily considered unowned-to be administered as owned resources. Security can be administered on a decentralized, application‑by‑application basis, and access to each transaction can be tailored with the same flexible restriction options available for other resources.
Through LCF, you can assign authorizations and restrictions to transactions on a user‑by‑user basis without impacting other users. Transactions controlled with LCF are not owned. If factors such as administrative scope and resource auditing capabilities are considered highly important for your security environment this may not be the best approach.
The OTRAN resource name is shared by all CICS, CA‑IDMS, and IMS facilities. Protecting a transaction using OTRAN for a CICS region results in transactions of the same name being protected in all CICS, CA‑IDMS, and IMS regions under the control of CA Top Secret.
When securing transactions with OTRAN:
Transactions must be owned before being authorized.
Example: set up OTRAN security
This example has the Payroll Department (PAYDEPT) own the transaction PAYR:
TSS ADDTO(acid) OTRAN(transaction)
TSS ADDTO(PAYDEPT) OTRAN(PAYR)
CA Top Secret will not remove ownership unless all permissions are revoked.
To remove ownership of a transaction
TSS REVOKE(PAYPROG) OTRAN(PAYR)
TSS REMOVE(PAYDEPT) OTRAN(PAYR)
OTRAN resources can be designated using generic prefixes. Once a prefix is owned, any transaction beginning with that prefix is protected and must be permitted to other ACIDs.
Example: generic prefixing with OTRAN
This example gives ownership of transactions that begin with the prefix PAY to the ACID PAYDEPT:
TSS ADDTO(PAYDEPT) OTRAN(PAY)
Use the PERMIT command function to allow designated users to use the specified transactions in an unlimited or restricted manner.
Example: authorize OTRAN access
This example allows a user whose ACID is PAYPROG to access the transaction PAYR:
TSS PERMIT(PAYPROG) OTRAN(PAYR)
Program pathing can restrict the access of certain transactions to designated programs.
Program pathing is not supported by all facilities.
Example: OTRAN program pathing
This example allows PAYPROG to start the transaction PAYR through the PAYGRP program:
TSS PERMIT(PAYPROG) OTRAN(PAYR)
ACCESS(EXECUTE)
PRIVPGM(PAYGRP)
To reduce the chance of someone taking advantage of an unattended terminal, use reverification to force the terminal's user to supply his password to execute a particular transaction. Add ACTION(REVERIFY) to the PERMIT. Reverification is only supported for CICS and IMS.
Example: password reverification
This example forces reverification:
TSS PERMIT(USR01) OTRAN(PAYR)
ACTION(REVERIFY)
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|