Configuring ESM definitions
The following definitions control access to the
Security Policy Manager
server and the initial menu selection available. You must define the profiles and rules (depending on the ESM) in the default FACILITY class or the class defined in the
Security Policy Manager
configuration parameters.
ESM profiles
Parameter | Description |
---|---|
RSM.RSS.LOGIN | READ access Access is required for all users who are authorized to login to the HTTP interface. |
RSM.RSS.TOOLS | READ access Access is required for all users who are authorized to use the Tools features. Users can use the Tools features to issue commands and drive Security Policy Manager REXX from the browser. |
RSM.RSS.SPM (before SPE2107) RSM.RSS.ZDETECT | READ access When more than one product from the RSS family of products is installed, this access enables the application to appear in the product selection screen after logging in. |
RSM.RSS.BATCH | READ access Access is required for all users who need to run the ZDTBATCH batch utility. For RACF and TSS, you must specify the access. |
BMC.RSS.SPMCOMP | READ access or UPDATE access READ enables users to view the compliance queries from the browser. UPDATE enables users to change the compliance queries from the browser. |
BMC.RSS.SPMIMPRT | Import a custom table |
BMC.RSS.SPM | READ access Access is required for all users who need to run the ZDTBATCH batch utility. For RACF and TSS, you must specify the access. |
To control access to BMC AMI Resident Security Server and Security Policy Manager
Use the following examples as a guide to control access to the relevant ESM:
Examples of RACF profiles
The following example displays the syntax for RACF profiles for BMC AMI Resident Security Server:
RDEFINE FACILITY RSM.RSS.TOOLS owner(<owner>)
RDEFINE FACILITY RSM.RSS.SPM owner(<owner>)
RDEFINE FACILITY RSM.RSS.BATCH owner(<owner>)
PERMIT RSM.RSS.LOGIN CLASS(FACILITY) ID(<userID>) ACCESS(READ)
PERMIT RSM.RSS.TOOLS CLASS(FACILITY) ID(<userID>) ACCESS(READ)
PERMIT RSM.RSS.SPM CLASS(FACILITY) ID(<userID>) ACCESS(READ)
PERMIT RSM.RSS.BATCH CLASS(FACILITY) ID(<userID>) ACCESS(READ)
SETROPTS REFRESH RACLIST(FACILITY)
The following example displays the syntax for RACF profiles for Security Policy Manager:
RDEFINE FACILITY BMC.RSS.SPMIMPRT owner(<owner>)
RDEFINE FACILITY BMC.RSS.SPM owner(<owner>)
PERMIT BMC.RSS.SPMCOMP CLASS(FACILITY) ID(<userID>) ACCESS(UPDATE)
PERMIT BMC.RSS.SPMCOMP CLASS(FACILITY) ID(<userID>) ACCESS(READ)
PERMIT BMC.RSS.SPMIMPRT CLASS(FACILITY) ID(<userID>) ACCESS(READ)
PERMIT BMC.RSS.SPM CLASS(FACILITY) ID(<userID>) ACCESS(READ)
SETROPTS REFRESH RACLIST(FACILITY)
Replace the following placeholders:
- <owner>—RACF owner for the resource
- <userID>—RACF user identifier that is granted access to Security Policy Manager
Example of TSS definitions
The following example displays the syntax for TSS definitions for BMC AMI Resident Security Server:
TSS PERMIT(<userID>) IBMFAC(RSM.RSS.LOGIN) ACCESS(READ)
TSS PERMIT(<userID>) IBMFAC(RSM.RSS.TOOLS) ACCESS(READ)
TSS PERMIT(<userID>) IBMFAC(RSM.RSS.SPM) ACCESS(READ)
TSS PERMIT(<userID>) IBMFAC(RSM.RSS.BATCH) ACCESS(READ)
The following example displays the syntax for TSS definitions for Security Policy Manager:
TSS PERMIT(<userID>) IBMFAC(BMC.RSS.SPMCOMP) ACCESS(UPDATE)
TSS PERMIT(<userID>) IBMFAC(BMC.RSS.SPMCOMP) ACCESS(READ)
TSS PERMIT(<userID>) IBMFAC(BMC.RSS.SPMIMPRT) ACCESS(READ)
TSS PERMIT(<userID>) IBMFAC(BMC.RSS.SPM) ACCESS(READ)
Replace the <userID> placeholders with the TSS user identifier that is granted access to Security Policy Manager.
Example of ACF2 rules
The following rule sample displays the syntax for ACF2 rules for BMC AMI Resident Security Server:
$USERDATA(BMC AMI Security Policy Manager)
RSS.LOGIN UID(<userID>) SERVICE(READ) ALLOW
RSS.TOOLS UID(<userID>) SERVICE(READ) ALLOW
RSS.SPM UID(<userID>) SERVICE(READ) ALLOW
RSS.BATCH UID(<userID>) SERVICE(READ) ALLOW
- UID(NOACCESS) PREVENT
- UID(*) PREVENT
The following rule sample displays the syntax for ACF2 rules for Security Policy Manager:
$USERDATA(BMC AMI Security Policy Manager)
RSS.SPMCOMP UID(<userID>) SERVICE(UPDATE) ALLOW
RSS.SPMCOMP UID(<userID>) SERVICE(READ) ALLOW
RSS.SPMIMPRT UID(<userID>) SERVICE(READ) ALLOW
RSS.SPM UID(<userID>) SERVICE(READ) ALLOW
LOG
- UID(NOACCESS) PREVENT
- UID(*) PREVENT
Replace the <userID> placeholders with the ACF2 user identifier portion of the UID that is granted access to Security Policy Manager.
Where to go from here
After configuring ESM definitions, define the started task to the ESM.