Security Considerations › Set Up Trusted Access Security › Implement Trusted Access Security for Transfers to z/OS
Implement Trusted Access Security for Transfers to z/OS
To implement Trusted Access security, define a destination member with one or more TRUSTID entries.
The sample destination member below is used to determine if Trusted Access is permitted for requests from remote system 130.200.123.45. It contains four TRUSTID entries:
- The first entry has only the USERID coded, because it is a valid signon ID on the local z/OS system.
- The second entry is not a valid z/OS user and has a GROUPID coded to point to a valid z/OS user GEORGENG that will be used for a trusted transfer initiated by remote user TRUSTGNG.
- The third entry is not a valid z/OS user and has a GROUPID coded to point to a valid z/OS user USER003 that will be used for a trusted transfer initiated by remote user TRUSTGNG2.
- The fourth entry is a valid z/OS user and has a GROUPID coded to point an alternative valid z/OS user USER004 that will be used for a trusted transfer initiated by remote user TRUSTGNG3.
***********************************************************************
* FUNCTION: DEST FOR GEORGE'S WINDOWS (TCP/IP) *
***********************************************************************
TYPE=DEST
WRITER=
IPNAME=130.200.123.45
IPPORT=8044
TRUSTID=GEORGENG THIS IS A VALID z/OS signon
TRUSTID=TRUSTGNG,GEORGENG THIS PC USERID will use GEORGENG on z/OS
TRUSTID=TRUSTGNG2,USER003 THIS PC USERID will use USER003 on z/OS
TRUSTID=TRUSTGN32,USER004 THIS PC USERID will use USER004 on z/OS
|
Copyright © 2012 CA.
All rights reserved.
|
|