Defining CA top secret access rules
The following procedure defines access rules for CA Top Secret. Use the values in TSS ADD and TSS PERMIT Keywords for the ADD and PERMIT commands. Issue the commands from the command line during a TSO session.
1.Define a resource class in the resource definition table (RDT). The RESCODE is in hexadecimal notation. With Release 17.02 and more current, Strobe supports a user-defined resource class. See SECURITY_CLASS= for more information.
2. Specify the types of access allowed.
3. Assign ownership of the Strobe profile. The high-level qualifier of $STROBE must match the value in the PROFILE keyword of your PARMLIB.
TSS ADD(ownerid) STROBE($STROBE.)
4. Specify user access to target jobs of identified types on identified systems. Repeat for each user that needs access.
TSS PERMIT(userid|department|division)
STROBE($STROBE.sysid.jobtype.jobnamemask) ACCESS(READ)
5. Specify user access to MANAGER and ADMIN profiles; repeat for each user who requires access to Strobe administrative functions.
TSS PERMIT (userid) STROBE($STROBE.authtype) ACCESS(READ)
TSS ADD and TSS PERMIT Keywords
Keyword | Function |
---|---|
sysname | Provide the MVS system name, as specified in the IEASYSxx member of SYS1.PARMLIB. |
jobtype | Specify the type of target address space (job for batch job, stc for started tasks, tsu for TSO user IDs, appc for advanced program-to-program communication, omvs for OpenEdition). |
jobname | Identify the Job name or set of job names with a common prefix of targets to which CA Top Secret allows access.
|
userid | Specify the user ID of the submitter of the request. |
grp | Identify the group to which the user ID of the request submitter is defined. |
authtype | Specify the Strobe authorization type (ADMIN or MANAGER) for access to management functions. |
Task 3.6.1: Initialize the CA Top Secret Examples
The CA Top Secret examples assume that the following commands have been issued to define a resource class with the hex identifier 4A:
Example 1: Access to a Specific System
The following command defines and allows users belonging to the department (or division) STROBERS access to all address spaces running on system SYSA:
Example 2: Access to a Set of Jobs
The following commands give the user IDs WOLFE and DAVIS access to all batch jobs on system SYSB with job names beginning with RED.
TSS PERMIT(DAVIS) STROBE($STROBE.SYSB.JOB.RED*) ACCESS(READ)
Example 3: Privileged Access to Session Manager
The following commands authorize the user ID TIBBETTS to start Strobe from a batch job and the user ID JCDALY to maintain Strobe.
TSS PERMIT(JCDALY) STROBE($STROBE.ADMIN) ACCESS(READ)
Next, skip ahead to Implementing-security-in-a-multisystem-environment.