Valid on z/OS.
Use the KERBLINK keyword to:
You can map each principal in a foreign realm to its own user ID on your local z/OS system, or you can map all principals in a foreign realm to the same user ID on your system.
User IDs that map to foreign principals do not require KERB segments.
To define foreign‑principal‑name create an SDT KERBLINK record. The KERBNAME contains the principal name, fully qualified with the name of the foreign realm.
/…/foreign_realm/[foreign‑principal‑name]
To map a unique CA Top Secret User ID to each foreign principal, specify the foreign realm name and the foreign principal name. To map the same CA Top Secret User ID to every foreign principal in the foreign realm, specify the foreign realm name. In each case, you specify the local User ID using the KERBUSER option.
This keyword has the following format:
TSS ADDTO(SDT) KERBLINK(link_name)
LINKNAME(fully—qualified—name)
KERBUSER(local_acid)
Identifies the record. Must be a unique name within the KERBLINK SDT record type.
Range: 1 to 8 alphanumeric characters
A string which specifies the URL of the foreign realm in which the foreign principal user is defined. The KERBNAME under which the associated (foreign) ACID is defined. The format of this string is:
/ /foreign_realm_URL/Ýforeign_principal_KERBNAME
Note: If the foreign_principal_KERBNAME is not supplied, the definition refers to all Kerberos principal users defined in that specific foreign realm.
The ACID in the local system to which requested activities is assigned in the local system.
This keyword is used with:
|
Copyright © 2009 CA.
All rights reserved.
|
|