Previous Topic: Configuring CA Top Secret for Use With the PAM Server

Next Topic: Step 2:  Defining the Linux for zSeries User Mappings

Step 1: Define Linux Nodes to Security

All of the Linux nodes must be defined in the CA Top Secret Security database as NDT node elements. Use the following syntax for each node:

TSS ADD|REM|REP(NDT) LINUXNODE(node_name) [IPADDR(ip_address) FACILITY(facility_name) ACTIVE(YES|NO)]

Note: The use of ADD, REM, or REP is required

LINUXNODE(node_name)

Specifies the Linux system name. The maximum length is 246 mixed case characters.

IPADDR(ip_address)

Specifies the IP address for the Linux system. This is treated as a prefix.

FACILITY(facility_name)

Specifies the facility name to use for the system entry validation

ACTIVE(YES|NO)

Indicates whether the node is active and whether to perform system validation.

YES—Node is active and system validation is preformed

NO—Node is inactive and no system validation is performed. This is the default.

To see all defined Linux nodes enter:

TSS LIST(NDT) LINUXNODE(ALL)