Creating ESM resources
ESM profiles
The following definitions control access to the products and the initial menu selection available. By default, resources are defined in the FACILITY class. If you add resources to a class other than FACILITY, specify the class in the ClassName parameter in the configuration member.
The required profiles depend on the product features that are in use, but as a minimum, all users who have access to the browser-based applications must have READ access to RSM.RSS.LOGIN.
Parameter | Description |
---|---|
RSM.RSS.LOGIN | READ access Access is required for all users who are authorized to log in to the HTTP interface. |
RSM.RSS.TOOLS | READ access Access is required for all users who are authorized to use the Tools features. Users can use the Tools features to issue commands and drive SPM REXX from the browser. |
RSM.RSS.SPM | READ access When more than one product from the RSS family of products is installed, this access enables the application to appear in the product selection screen after logging in. |
RSM.RSS.BATCH | READ access Access is required for all users who need to run the ZDTBATCH batch utility. For RACF and TSS, you must specify the access. |
BMC.RSS.SPMCOMP | READ access or UPDATE access READ enables users to view compliance queries from the browser. UPDATE enables users to change compliance queries from the browser. |
BMC.RSS.SPMIMPRT | Import a custom table |
BMC.RSS.SPM | READ access Access is required for all users who need to run the ZDTBATCH batch utility. For RACF and TSS, you must specify the access. |
To control access to the product
Use the following examples as a guide to control access to the relevant ESM:
Examples of RACF profiles
The following code blocks are examples of syntax for RACF profiles.
RDEFINE FACILITY RSM.RSS.TOOLS owner(<owner>)
RDEFINE FACILITY RSM.RSS.SPM owner(<owner>)
RDEFINE FACILITY RSM.RSS.BATCH owner(<owner>)
PERMIT RSM.RSS.LOGIN CLASS(FACILITY) ID(<userID>) ACCESS(READ)
PERMIT RSM.RSS.TOOLS CLASS(FACILITY) ID(<userID>) ACCESS(READ)
PERMIT RSM.RSS.SPM CLASS(FACILITY) ID(<userID>) ACCESS(READ)
PERMIT RSM.RSS.BATCH CLASS(FACILITY) ID(<userID>) ACCESS(READ)
SETROPTS REFRESH RACLIST(FACILITY)
RDEFINE FACILITY BMC.RSS.SPMIMPRT owner(<owner>)
RDEFINE FACILITY BMC.RSS.SPM owner(<owner>)
PERMIT BMC.RSS.SPMCOMP CLASS(FACILITY) ID(<userID>) ACCESS(UPDATE)
PERMIT BMC.RSS.SPMCOMP CLASS(FACILITY) ID(<userID>) ACCESS(READ)
PERMIT BMC.RSS.SPMIMPRT CLASS(FACILITY) ID(<userID>) ACCESS(READ)
PERMIT BMC.RSS.SPM CLASS(FACILITY) ID(<userID>) ACCESS(READ)
SETROPTS REFRESH RACLIST(FACILITY)
Replace the following placeholders:
- <owner>—RACF owner for the resource
- <userID>—RACF user identifier that is granted access to the product
Example of TSS definitions
The following code blocks are examples of syntax for TSS definitions.
TSS PERMIT(<userID>) IBMFAC(RSM.RSS.LOGIN) ACCESS(READ)
TSS PERMIT(<userID>) IBMFAC(RSM.RSS.TOOLS) ACCESS(READ)
TSS PERMIT(<userID>) IBMFAC(RSM.RSS.SPM) ACCESS(READ)
TSS PERMIT(<userID>) IBMFAC(RSM.RSS.BATCH) ACCESS(READ)
TSS PERMIT(<userID>) IBMFAC(BMC.RSS.SPMCOMP) ACCESS(UPDATE)
TSS PERMIT(<userID>) IBMFAC(BMC.RSS.SPMCOMP) ACCESS(READ)
TSS PERMIT(<userID>) IBMFAC(BMC.RSS.SPMIMPRT) ACCESS(READ)
TSS PERMIT(<userID>) IBMFAC(BMC.RSS.SPM) ACCESS(READ)
Replace the <userID> placeholders with the TSS user identifier that is granted access to the product.
Example of ACF2 rules
The following code blocks are examples of syntax for ACF2 rules.
$USERDATA(BMC AMI Security Policy Manager)
RSS.LOGIN UID(<userID>) SERVICE(READ) ALLOW
RSS.TOOLS UID(<userID>) SERVICE(READ) ALLOW
RSS.SPM UID(<userID>) SERVICE(READ) ALLOW
RSS.BATCH UID(<userID>) SERVICE(READ) ALLOW
- UID(NOACCESS) PREVENT
- UID(*) PREVENT
$USERDATA(BMC AMI Security Policy Manager)
RSS.SPMCOMP UID(<userID>) SERVICE(UPDATE) ALLOW
RSS.SPMCOMP UID(<userID>) SERVICE(READ) ALLOW
RSS.SPMIMPRT UID(<userID>) SERVICE(READ) ALLOW
RSS.SPM UID(<userID>) SERVICE(READ) ALLOW
LOG
- UID(NOACCESS) PREVENT
- UID(*) PREVENT
Replace the <userID> placeholders with the ACF2 user identifier portion of the UID that is granted access to the product.
Installing the Top Secret installation exit TSSINSTX for SPM
To use CA Top Secret (TSS) resources, BMC AMI Security Policy Manager requires use of the Top Secret installation exit (TSSINSTX) to capture events that happen within a Top Secret protected system. SPM captures all Top Secret commands that are entered and any password changes that occur through the TSSINSTX exit.
If your site does not currently use TSSINSTX, you can use the sample exit provided in the RSSSAMP library. BMC supplies a sample exit that utilizes a macro, ECIDYNX, which dynamically loads the exit code that is required for effective SPM operation.
If your site uses TSSINSTX, it requires a modification for BMC code to be called. You must insert the supplied ECIDYNX macro into your site’s TSSINSTX.
BMC supplies exits designed to be pseudo-dynamically loaded. The ECIDYNX macro calls a dynamically loaded exit loaded by the master address space. After you apply maintenance to SPM, which involves changes to exit routines, only the master address space needs to be restarted to activate the new exit code.
Using the ECIDYNX macro
Use the ECIDYNX macro to call the supplied exit routines from an existing exit routine.
Use the following statement:
The statement uses the following values:
- TSSINSTX is the name of the exit to be called.
- RSMZDTEC is the name of the master address space token.
The ECIDYNX macro requires Register 1 to point to the original parameter list supplied by TSS when the exit was called.
Linkage
System exits that invoke the ECIDYNX macro must include ECIMSTXT from RSSLOAD.
Use the following sample JCL to assemble and link the sample TSSINSTX exit.
// PARM=('SYSPARM(),LINECOUNT(0),SUPRWARN(042)',
// 'NOXREF,NODXREF,NORXREF,NOMXREF,NORLD,USING(NOMAP),RENT')
//SYSLIB DD DISP=SHR,DSN=<hlq>.RSSSAMP
// DD DISP=SHR,DSN=SYS1.MACLIB
// DD DISP=SHR,DSN=SYS1.MODGEN
//SYSUT1 DD UNIT=SYSDA,SPACE=(CYL,(3,2))
//SYSLIN DD DISP=(,PASS),SPACE=(CYL,(5,0,0)),
// DCB=BLKSIZE=400,DSN=&&EXIT
//SYSPRINT DD SYSOUT=*
//SYSIN DD DISP=SHR,DSN=<hlq>.RSSSAMP(RSSINSTX)
//*
//BGKLINK1 EXEC PGM=IEWL,
// PARM='LIST,XREF,LET,AMODE=31,RMODE=ANY,AC(1),CASE=MIXED,
// RENT,REUS'
//RSSLOAD DD DISP=SHR,DSN=<hlq>.RSSLOAD
//SYSLMOD DD DISP=SHR,DSN=<hlq>.RSSLOAD
//SYSUT1 DD UNIT=SYSDA,SPACE=(CYL,(3,2))
//SYSLIN DD DISP=(OLD,DELETE),DSN=&&EXIT
// DD *
INCLUDE RSSLOAD(ECIMSTXT)
ENTRY TSSINSTX
NAME TSSINSTX(R)
//SYSPRINT DD SYSOUT=*
//
Creating ESM user IDs for SSPR
BMC AMI Security Self Service Password Reset requires an ESM user ID to reset a user's password.
For RACF, create a user ID in one of the following ways:
- Set the SSPR STC user ID to have RACF authority to RESET passwords
- Define a dedicated user ID with RACF authority to RESET passwords and specify the RACFAdminUser in the BMC AMI Resident Security Server global configuration parameters. For more information, see Global-configuration-parameters.
Where to go from here
For BMC AMI Enterprise Connector for Venafi, see additional ESM content for BMC AMI Enterprise Connector for Venafi, and then see Defining-a-checkpoint-data-set.
For all other products, after you create ESM resources, see Creating-a-database-directory.