Resources protected by LCF are known as unownable resources. LCF resources are added to individual ACIDs to provide access. They are not permitted. LCF security allows the security administrator to limit:
When securing transactions with LCF:
It is recommended that within a single facility inclusive or exclusive LCF be used to secure sensitive transactions (not a combination of both).
Transactions protected through LCF must be defined by facility. Divide transactions by function or subset and as a group within profiles. This way transactions are defined only once per group, instead of once per user. You can then limit access to the transaction with an inclusive list that specifies which transactions the user is allowed to use, or an exclusive list that specifies which transactions the user is not allowed to use.
The inclusive approach restricts an ACID to using only specifically authorized transactions for a particular facility. An inclusive list is indicated by the CMD or TRANS keyword. (These keywords are interchangeable.)
Use of user definable facility entries USER77 through USER221 are not recommended for LCF. LCF processing considers the use of these facilities identical, even after the facility entries have been renamed.
When specifying an inclusive list, use the syntax:
TSS ADDTO(acid) TRANSACTIONS(facility,(trans,trans...))
Example: limit access
This example restricts the users connected to the PROF01 profile to using only the DDYA, DDYU, and DDYY transactions under the CICSPROD facility:
TSS ADDTO(PROF01) TRANSACTIONS(CICSPROD,(DDYA,DDYU,DDYY))
The exclusive approach allows an ACID to use all transactions except a specific list of restricted transactions for a particular facility. An exclusive list is indicated by the XCOMMAND or XTRANSACTIONS keyword. (These keywords are interchangeable.) For purposes of LCF protection, facility entities USER77 through USER221 are not considered unique.
When specifying an exclusive list, use the syntax:.
TSS ADDTO(acid) XCOMMAND(facility,(trans,trans...))
Example: limiting access
This example allows USER01 to use all of the TSO transactions except the SPF EDIT (SPF2) panel:
TSS ADDTO(USER01) XCOMMAND(TSO,(SPF2))
When CA Top Secret is validating an ACID's request to access a command, the following decision‑making process is used:
Using both inclusive and exclusive LCF lists within a single facility is not recommended. A mixture of LCF‑types is difficult to maintain.
If you use both inclusive and exclusive lists, make sure your definitions do not contradict each other. For example:
TSS ADDTO(CCC) TRANSACTIONS(CICSA,(ABCT))
TSS ADDTO(CCC) XTRANSACTIONS(CICSA,(ABCT))
CA Top Secret uses the following decision‑making process if the list types are mixed:
Within each level of the ACID's Security Records, inclusive then exclusive checking is performed before the next record level, (for example Profile) is reached.
After all levels of checking have been completed, and if both exclusive and inclusive LCF were executed during the security record search, then inclusive LCF logic takes precedence and the record is rejected.
You can provide default protection for transactions by using the XDEF and NOXDEF sub-options of the FACILITY control option.
In FAIL mode, a transaction cannot be executed by a user unless that user is defined to CA Top Secret.
Example: default protection
This example specifies the XDEF option for the CICSPROD facility:
TSS MODIFY(FACILITY(CICSPROD=XDEF))
To specify that a particular user or profile is to bypass all LCF security, attach the NOLCFCHK bypass attribute to its ACID. NOLCFCHK use should be carefully restricted.
This attribute is sometimes used with CICS or IMS region ACIDs to avoid the administrative overhead of granting region permission for every transaction taking place.
Example: bypass LCF security
This example allows the ACID SUPRACID to bypass all LCF security checking:
TSS ADDTO(SUPRACID) NOLCFCHK
You can use generic prefixes when specifying transactions within an inclusive or an exclusive list. A generic LCF rule is invalid for password reverification.
When using generic prefixing, append a G to the prefix to indicate that a generic prefix is being supplied.
Example: generic prefixing
This example restricts the ACID PDGRLP from using all batch programs that begin with the characters IEH:
TSS ADDTO(PDGRLP) XTRANSACTIONS(BAT,(IEH(G))
To reduce the chance of someone taking advantage of an unattended terminal, use reverification to force the terminal's user to supply his password to execute a particular transaction. Append a V to the transaction.
Note the following:
Example: reverification
This example forces reverification:
TSS ADDTO(USR01) TRANSACTIONS(CICSPROD,(PAY9(V)))
You can use an exclusive LCF list to permit access to all transactions in a facility that, by default, protects all transactions. To allow access to all transactions within a facility, specify an exclusive LCF list for a transaction that does not exist.
Example: access all transactions
This example specifies an exclusive LCF list for the CICS facility, listing NULL as the restricted transaction:
TSS ADDTO(USER01) XTRANSACTIONS(CICSPROD,(NULL))
Because NULL does not exist, USER01 is allowed access to all CICS transactions.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|