Identifying and protecting resources that need security
Use the following procedure to identify and protect resources that need to be secured with an ESM for BMC II for z/OS and BMC II for z/OS System Access Facility (SAF).
You can select resources that you want to protect whether they reside within BMC II for z/OS or the SAF element of z/OS.
To identify and protect resources
Specify the resources that you want to protect by designating their names as follows:
Resources for BMC II for z/OS
To protect the ability to
Use this resource name
Issue BBI control commands (such as .RESET, .CANCEL, .STOP, .START)
prefix.ssid.BBI.target.BBICMD
Additionally, if you want to secure access to BBI commands from users at the console, specify FEATURE=CONSCMD on the TYPE=BBI statement in BBSEC.
Alternatively, you can secure access to BBI action commands but allow users to use BBI display commands. To do so, specify FEATURE=BBIDISP on the TYPE=BBI statement, and define the resource name to IBM RACF as prefix.ssid.BBI.target.BBIDISP.
Write messages to the BBI journal log
prefix.ssid.BBI.ssid.JRNLMSG
Display the Rules Processor application to access and display Rules within the Rules Processor
prefix.ssid.AAO.ssid.RULEREAD
Update the Rules Processor application to update and create new Rules in the Rules Processor application
Users with update access can alter anything that would affect Rule actions, such as enable or disable Rule Sets, move Rules within a Rule Set, or change search strategy.
prefix.ssid.AAO.ssid.RULEUPD
- To identify the BMC II for z/OS SAF resources that you want to secure with an ESM, use the CLISTs that are provided in the BBSAMP data set.For example, to define resources to RACF, run the IIZRDEF CLIST (once for every BBI-SS PAS and for every target that you are securing). The IIZRDEF CLIST prompts you to enter the following information:
- SAF resource class to use (where $BOOLE is the default)
- Prefix to use as the high-level qualifier for each resource name (where BBM is the default)
- BMC II for z/OS BBI-SS subsystem ID for which you are defining resources
- Default universal access (UACC) for all resources (READ or NONE)
Where to go from here
After identifying resources to protect, you can grant access to specific users. For more information, see Granting-access-to-resources-and-actions.