Managing IBM MQ object security



This section describes how to manage user access to various areas and operations of MainView Middleware Monitor (MVMM) and the data it handles.

The MVMM Agent can be configured to run as either a secure or unsecure agent.

  • Using a secure agent forces the user to supply a IBM MQ authorized user account to change or use secure IBM MQ objects. 

  • An unsecure agent does not verify user account authorization.

Related topic

Note

MVMM enforces IBM MQ object security only on AIX, HP-UX, Linux, zLinux, Solaris, z/OS and Windows.

Note

When the 

MVMM

Extensible Agent is in unsecured mode (by default), all requests are performed under the user that starts the qpcfg process.

Users, user groups, and permissions

Minimum authority for all MVMMusers, regardless of which group they belong to or what authority they might have, must include display, get, inquire, and put messages from two system-defined queues:

  • SYSTEM.ADMIN.COMMAND.QUEUE
  • SYSTEM.MQSC.REPLY.QUEUE (inquire not needed)

Both of these queues must be explicitly shared on each queue manager.

IBM MQ object security grants or denies access to any object based on the permissions accorded to that user and the settings on the object. This enables you to control exactly what users or groups have access to a particular object. With MVMM, you can set those permissions using a graphical interface. 

For IBM MQ on AIX, HP-UX, Linux, Solaris, and zLinux, you can define different users and groups for security. 

Windows behaves differently than UNIX regarding permissions. Users can have permissions in addition to those of the group to which they belong, but permissions cannot be removed from users that are specifically granted by the group to which they belong. For more information, see the IBM MQ System Administration Guide.

Note

IBM MQ security is set for objects and users at the operating system level, not from MVMM. If you attempt to use MVMMto set IBM MQ security on z/OS, an error appears informing you that the feature is not supported.

Logging

If logging is enabled, all security violation messages are logged in the audit log database. The audit log contains a single permanent record of activities between MVMMand IBM MQ objects. 

Test queues

Minimum authority for all MVMMusers, regardless of which group they belong to or what authority they might have, must include display, get, inquire, and put messages from two system-defined queues:

  • SYSTEM.ADMIN.COMMAND.QUEUE
  • SYSTEM.MQSC.REPLY.QUEUE (inquire not needed)

Both of these queues must be explicitly shared on each queue manager.

IBM MQ object security grants or denies access to any object based on the permissions accorded to that user and the settings on the object. This enables you to control exactly what users or groups have access to a particular object. With MVMM, you can set those permissions using a graphical interface. 

For IBM MQ on AIX, HP-UX, Linux, Solaris, and zLinux, you can define different users and groups for security. 

Windows behaves differently than UNIX regarding permissions. Users can have permissions in addition to those of the group to which they belong, but permissions cannot be removed from users that are specifically granted by the group to which they belong. For more information, see the IBM MQ System Administration Guide


Note

IBM MQ security is set for objects and users at the operating system level, not from MVMM. If you attempt to use MVMMto set IBM MQ security on z/OS, an error appears informing you that the feature is not supported.

Logging

If logging is enabled, all security violation messages are logged in the audit log database. The audit log contains a single permanent record of activities between MVMMand IBM MQ objects. 

IBM MQ object security reference

The following examples show how you might use IBM MQ object security. 

Example 1

A large company relies on IBM MQ throughout its organization to transport data to and from queues. This company might have their finance department in England and their manufacturing plant in Germany. The company wants the finance department to be able to create queues in England, but not in the manufacturing plant in Germany. With IBM MQ object security, the user in the finance department in England might be able to connect to the queue managers in the manufacturing plant in Germany, however, they do not necessarily have enough privileges to create, delete, clear queues and so on. They are still allowed to create, delete, and clear queues on their own system.

Example 2

A second scenario might involve configuring higher levels of access on test queues versus more restricted access on production queues located on the same queue manager.


This section describes how to manage user access to various areas and operations of MainView Middleware Monitor (MVMM) and the data it handles.

The MVMM Agent can be configured to run as either a secure or unsecure agent.

  • Using a secure agent forces the user to supply a IBM MQ authorized user account to change or use secure IBM MQ objects. 

  • An unsecure agent does not verify user account authorization.

Related topic

Note

MVMM enforces IBM MQ object security only on AIX, HP-UX, Linux, zLinux, Tru64 UNIX, Solaris, z/OS and Windows.

Note

When the 

MVMM

Extensible Agent is in unsecured mode (by default), all requests are performed under the user that starts the qpcfg process.

Users, user groups, and permissions

Minimum authority for all MVMMusers, regardless of which group they belong to or what authority they might have, must include display, get, inquire, and put messages from two system-defined queues:

  • SYSTEM.ADMIN.COMMAND.QUEUE
  • SYSTEM.MQSC.REPLY.QUEUE (inquire not needed)

Both of these queues must be explicitly shared on each queue manager.

IBM MQ object security grants or denies access to any object based on the permissions accorded to that user and the settings on the object. This enables you to control exactly what users or groups have access to a particular object. With MVMM, you can set those permissions using a graphical interface. 

For IBM MQ on AIX, HP-UX, Linux, Solaris, and zLinux, you can define different users and groups for security. 

Windows behaves differently than UNIX regarding permissions. Users can have permissions in addition to those of the group to which they belong, but permissions cannot be removed from users that are specifically granted by the group to which they belong. For more information, see the IBM MQ System Administration Guide.

Note

IBM MQ security is set for objects and users at the operating system level, not from MVMM. If you attempt to use MVMMto set IBM MQ security on z/OS, an error appears informing you that the feature is not supported.

Logging

If logging is enabled, all security violation messages are logged in the audit log database. The audit log contains a single permanent record of activities between MVMMand IBM MQ objects. 

Test queues

Minimum authority for all MVMMusers, regardless of which group they belong to or what authority they might have, must include display, get, inquire, and put messages from two system-defined queues:

  • SYSTEM.ADMIN.COMMAND.QUEUE
  • SYSTEM.MQSC.REPLY.QUEUE (inquire not needed)

Both of these queues must be explicitly shared on each queue manager.

IBM MQ object security grants or denies access to any object based on the permissions accorded to that user and the settings on the object. This enables you to control exactly what users or groups have access to a particular object. With MVMM, you can set those permissions using a graphical interface. 

For IBM MQ on AIX, HP-UX, Linux, Solaris, and zLinux, you can define different users and groups for security. 

Windows behaves differently than UNIX regarding permissions. Users can have permissions in addition to those of the group to which they belong, but permissions cannot be removed from users that are specifically granted by the group to which they belong. For more information, see the IBM MQ System Administration Guide

Note

IBM MQ security is set for objects and users at the operating system level, not from MVMM. If you attempt to use MVMMto set IBM MQ security on z/OS, an error appears informing you that the feature is not supported.

Logging

If logging is enabled, all security violation messages are logged in the audit log database. The audit log contains a single permanent record of activities between MVMMand IBM MQ objects. 

IBM MQ object security reference

The following examples show how you might use IBM MQ object security. 

Example 1

A large company relies on IBM MQ throughout its organization to transport data to and from queues. This company might have their finance department in England and their manufacturing plant in Germany. The company wants the finance department to be able to create queues in England, but not in the manufacturing plant in Germany. With IBM MQ object security, the user in the finance department in England might be able to connect to the queue managers in the manufacturing plant in Germany, however, they do not necessarily have enough privileges to create, delete, clear queues and so on. They are still allowed to create, delete, and clear queues on their own system.

Example 2

A second scenario might involve configuring higher levels of access on test queues versus more restricted access on production queues located on the same queue manager.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*