Reports for RACF
For details about the Tools menu, see Administering.
Data sets
Click Data sets and select one of the following reports to display information about sensitive data sets:
- Non-Fully Qualified Generic > APF
- Non-Fully Qualified Generic > Other
- Sensitive Data Sets > UACC > None
- Sensitive Data Sets > ID(*) > None
- Sensitive Data Sets > WARN
- Sensitive Data Sets > Uncatalogued
- Sensitive Data Sets > Inappropriate Audit
- Sensitive Data Sets > Level=99
- Sensitive Data Sets > All
Non-Fully Qualified Generic > APF
APF Data Sets without Fully Qualified Generic profile
This option lists all APF data sets that do not have a Fully Qualified Generic data set profile defined in RACF:
System | Data set name | Protecting Profile |
---|---|---|
RSMP | SYS1.SVCLIB | SYS1.** |
RSMP | AZF.SAZFLOAD | AZF.** |
RSMP | CBC.SCLBDLL | CBC.** |
RSMP | CBC.SCLBDLL2 | CBC.** |
Column | Description |
---|---|
SYSTEM | System ID from which the record was written |
DATASET NAME | Name of the data set |
PROTECTING PROFILE | RACF profile that protects the data set |
Non-Fully Qualified Generic > Other
Other Data Sets with Non-Fully Qualified Generic profiles
This option lists all other sensitive data sets that do not have a fully qualified generic data set profile defined in RACF:
System | Data set Name | Protecting Profile | Data set Type |
---|---|---|---|
RSMP | SYS1.LINKLIB.EXITS | SYS1.** | LINK |
RSMP | USER.LINKLIB | USER.** | LINK |
RSMP | SYS1.SIEALNKE | SYS1.** | LINK |
RSMP | SYS1.SIEAMIGE | SYS1.** | LINK |
Column | Description |
---|---|
SYSTEM | System ID from which the record was written |
DATASET NAME | Name of the data set |
PROTECTING PROFILE | Non-fully qualified generic RACF profile that is protecting the data set |
DATASET TYPE | Type of sensitive data set being reported on, such as APF or Link |
Sensitive Data Sets > UACC > None
Sensitive Data Sets with UACC > None
This option lists all RACF data set profiles with a universal access (UACC) greater than NONE for sensitive data sets:
System | Data set Name | Protecting Profile | UACC | Data set Type |
---|---|---|---|---|
RSMP | CICSTS52.CICS.SDFHAUTH | CICSTS52.** | Read | APF |
RSMP | CICSTS52.CICS.SDFHLIC | CICSTS52.** | Read | APF |
RSMP | CICSTS52.CICS.SDFJAUTH | CICSTS52.** | Read | APF |
RSMP | CICSTS52.CPSM.SEYUAUTH | CICSTS52.** | Read | APF |
Column | Description |
---|---|
SYSTEM | System ID from which the record was written |
DATASET NAME | Name of the data set |
PROTECTING PROFILE | Non-fully qualified generic RACF profile that is protecting the data set |
UACC | Universal ACCess of the sensitive data set |
DATASET TYPE | Type of sensitive data set being reported on, such as APF or Link |
Sensitive Data Sets > ID(*) > None
Sensitive Data Sets with ID(*) > None
This option lists all RACF data set profiles with ID(*) greater than NONE:
System | Data set Name | Protecting Profile | ID(*) | Data set Type |
---|---|---|---|---|
RSMP | SYS1.LINKLIB | SYS1.LINKLIB | Read | APF |
RSMP | AZF.SAZFLOAD | AZF.** | Read | APF |
RSMP | CBC.SCLBDLL | CBC.** | Read | APF |
RSMP | CBC.SCLBDLL2 | CBC.** | Read | APF |
Column | Description |
---|---|
SYSTEM | System ID from which the record was written |
DATASET NAME | Name of the data set |
PROTECTING PROFILE | Non-fully qualified generic RACF profile that is protecting the data set |
ID(*) | Default access for defined users |
DATASET TYPE | Type of sensitive data set being reported on, such as APF or Link |
Sensitive Data Sets > WARN
Sensitive Data Sets with WARN
This option lists all RACF data set profiles that are in WARNING mode:
System | Data set Name | Protecting Profile | Data set Type |
---|---|---|---|
RSMP | ISVR.RSS.LOADLIB | ISVR.RSS.** | APF |
RSMP | ISVR.RSS.SSPR.V2R1M0.RSMLOAD | ISVR.RSS.** | APF |
RSMP | ISVR.RSS.VIA.V2R1M0.RSMLOAD | ISVR.RSS.** | APF |
RSMP | ISVR.RSS.V2R1M0.RSMLOAD | ISVR.RSS.** | APF |
Column | Description |
---|---|
SYSTEM | System ID from which the record was written |
DATASET NAME | Name of the data set |
PROTECTING PROFILE | RACF profile that is protecting the data set |
DATASET TYPE | Type of sensitive data set being reported on, such as APF or Link |
Sensitive Data Sets > Uncatalogued
Uncatalogued Sensitive Data Sets
This option lists all RACF Uncatalogued Sensitive Data sets:
System | Data set Name | Protecting Profile | Data set Type |
---|---|---|---|
RSMP | ISVR.CA.SYSVIEW.V15R00.CNM4BLOD | ISVR.CA.SYSVIEW.** | APF |
RSMP | ISVR.COMPWARE.CPWR.MPAA170.SPAAAUTH | ISVR.COMPWARE.** | APF |
RSMP | ISVR.COMPWARE.CPWR.MKAZ170.SKAZAUTH | ISVR.COMPWARE.** | APF |
RSMP | ISVR.COMPWARE.CPWR.MKFX171.SKFXAUTH | ISVR.COMPWARE.** | APF |
Column | Description |
---|---|
SYSTEM | System ID from which the record was written |
DATASET NAME | Name of the data set |
PROTECTING PROFILE | RACF profile that is protecting the data set |
DATASET TYPE | Type of sensitive data set being reported on, such as APF or Link |
Sensitive Data Sets > Inappropriate Audit
Sensitive Data Sets with Inappropriate Audit
This option lists all RACF data set profiles for sensitive data sets that do not comply with the recommended best practices for audit settings:
System | Data set Name | Protecting Profile | Audit S/F? | Data set Type |
---|---|---|---|---|
RSMP | SYS1.SVCLIB | SYS1.** | -/R | APF |
RSMP | CBC.SCLBDLL | CBC.** | -/R | APF |
RSMP | CBC.SCLBDLL2 | CBC.** | -/R | APF |
RSMP | CSF.SCSFMOD0 | CSF.** | -/R | APF |
This relates to the audit settings, e.g. Success(UPDATE) and Fail(READ), often abbreviated to S/F. This display shows the Audit Level (both Successes and Failures) in a three-character format: a success level, a forward slash, a failures level.
Column | Description |
---|---|
SYSTEM | System ID from which the record was written |
DATASET NAME | Name of the data set |
PROTECTING PROFILE | RACF profile that is protecting the data set |
AUDIT S/F? | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
DATASET TYPE | Type of sensitive data set being reported on, such as APF or Link |
Sensitive Data Sets > Level=99
Sensitive Data Sets with Level = 99
This option lists all data sets with a RACF level of 99:
System | Data set Name | Protecting Profile | Volume | Creation Date | Referenced Date | Catalogued? | SMS? | APF? | UACC | ID(*) | Fully Qualified Generic? | Warning? | Audit S/F | Data set Type | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
RSMP | ISVR.RSS.SUE.QA.TEST | ISVR.RSS.SUE.** | TISV08 | 29/01/2019 | 1900-01-00 | Y | Y | Y | Read | Read | N | Y | R/R | APF | ||||||||||
RSMP | TSGNJC.TEST.XMIT | TSGNJC.TEST.** | TTSO01 | 16/01/2019 | 16/01/2019 | Y | Y | Y | None | N | N | -/R | APF |
Column | Description |
---|---|
SYSTEM | System ID from which the record was written |
DATASET NAME | Name of the data set |
PROTECTING PROFILE | RACF profile that is protecting the data set |
VOLUME | Volume Serial number |
CREATION DATE | Date of data set creation |
REFERENCED DATE | Date last referenced |
CATALOGED? | Whether the data set is cataloged |
SMS? | Whether the data set SMS is controlled |
APF? | APF Library Indicator |
UACC | Universal ACCess for undefined user IDs |
ID(*) | Default access for defined user IDs |
FULLY QUALIFIED GENERIC? | FQG indicator |
WARNING? | Whether the profile has the WARNING attribute |
AUDIT S/F | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
DATASET TYPE | Type of sensitive data set being reported on, such as APF or Link |
Sensitive Data Sets > All
All Sensitive Data Sets
This option lists all sensitive data sets and includes any relevant information:
System | Data set Name | Protecting Profile | Volume | Creation Date | Referenced Date | Cataloged? | SMS? | APF? | UACC | ID(*) | Fully Qualified Generic? | Warning? | Level | Audit S/F | Data set Type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
RSMP | CATALOG.CICS.UCAT.Z210 | CATALOG.** | CPWRK3 | 18/12/2014 | 06/02/2019 | Y | None | Read | N | N | 0 | -/R | UCAT | ||
RSMP | CATALOG.EXPRESS.SMPE.UCAT | CATALOG.** | SYS001 | 11/02/2019 | 12/02/2019 | Y | None | Read | N | N | 0 | -/R | UCAT | ||
RSMP | CATALOG.FDRPAS.SHARED | CATALOG.** | IODF01 | 17/11/2017 | 06/02/2019 | Y | None | Read | N | N | 0 | -/R | UCAT | ||
RSMP | CATALOG.IMS.USER | CATALOG.** | PTSG06 | 11/12/2015 | 06/02/2019 | Y | None | Read | N | N | 0 | -/R | UCAT |
Column | Description |
---|---|
SYSTEM | System ID from which the record was written |
DATASET NAME | Name of the data set |
PROTECTING PROFILE | RACF profile that is protecting the data set |
VOLUME | Volume serial number |
CREATION DATE | Date of data set creation |
REFERENCED DATE | Date last referenced |
CATALOGED? | Whether the data set is cataloged or not |
SMS? | Whether the data set SMS is controlled |
APF? | APF library indicator |
UACC | Universal ACCess for undefined user IDs |
ID(*) | Default access for defined user IDs |
FULLY QUALIFIED GENERIC? | FQG indicator |
WARNING? | Whether the profile has the WARNING attribute |
LEVEL | Data set level |
AUDIT S/F | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
DATASET TYPE | Type of sensitive data set being reported on, such as APF or Link |
Sensitive Commands
Click Sensitive Commands and select one of the following reports to display information about sensitive commands:
MVS.SETPROG
MVS.SETPROG Commands
Lists all MVS SETPROG commands issued in the system and related information:
System | Date | Time | Userid | Name | From | Event | Command | Details |
---|---|---|---|---|---|---|---|---|
RSMP | 12/02/2019 | 13:37:46 | REXXBAT | Unknown | CONSOLE | CONS | SETPROG APF,ADD,DSN=ISVR.RSS.QA.ZDT.RSMLOAD,VOL=NC3998 | System Command |
RSMP | 12/02/2019 | 13:37:45 | REXXBAT | Unknown | CONSOLE | CONS | SETPROG APF,ADD,DSN=ISVR.RSS.QA.ZDT.RSMLOAD,VOL=NC3997 | System Command |
RSMP | 12/02/2019 | 13:37:44 | REXXBAT | Unknown | CONSOLE | CONS | SETPROG APF,ADD,DSN=ISVR.RSS.QA.ZDT.RSMLOAD,VOL=NC3996 | System Command |
RSMP | 12/02/2019 | 13:37:43 | REXXBAT | Unknown | CONSOLE | CONS | SETPROG APF,ADD,DSN=ISVR.RSS.QA.ZDT.RSMLOAD,VOL=NC3995 | System Command |
Column | Description |
---|---|
SYSTEM | System ID from which the record was written |
DATE | Date the command was executed |
TIME | Time the command was executed |
USERID | User ID that issued the command |
NAME | Name of the user, if available |
FROM | Where the command was entered |
EVENT | Internal event type or SMF Event and Event Qualifier Event refers to the SMF Event/Code Qualifier documented in the IBM SMF manuals, or CONS for a command entered at the system console. |
COMMAND | Command that was entered |
DETAILS | Internal event type |
SETROPTS
Lists all RACF SETROPTS commands issued in the system and related information:
System | Date | Time | Userid | User Name | Port Of Entry | Event | Description | Command Image |
---|---|---|---|---|---|---|---|---|
RSMP | 14/02/2019 | 12:15:59 | AUSER | Fred Smith | A05TCP45 | 1800 | SETROPTS command | SETROPTS RACLIST(XFACILIT) REFRESH |
RSMP | 14/02/2019 | 12:14:15 | BUSER | Dave Jones | A05TCP57 | 1800 | SETROPTS command | SETROPTS GENERIC(DATASET) REFRESH |
RSMP | 14/02/2019 | 12:11:29 | CUSER | Bert Williams | A05TCP34 | 1800 | SETROPTS command | SETROPTS RACLIST(STARTED) REFRESH |
RSMP | 14/02/2019 | 12:09:23 | DUSER | Tina Brown | A05TCP19 | 1800 | SETROPTS command | SETROPTS RACLIST(OPERCMDS) REFRESH |
Column | Description |
---|---|
SYSTEM | System ID from which the record was written |
DATE | Date the command was executed |
TIME | Time the command was executed |
USERID | User ID that issued the command |
USER NAME | Name of the user, if available |
PORT OF ENTRY | Where the command was entered |
EVENT | Internal event type or SMF event and event qualifier Event refers to the SMF event/code qualifier documented in the IBM SMF manuals, or CONS for a |
DESCRIPTION | Command that was entered |
COMMAND IMAGE | Internal event types |
All MVS Commands
Lists all MVS commands issued in the system and related information:
System | Date | Time | Userid | User Name | Port Of Entry | Event | Description | Command Image |
---|---|---|---|---|---|---|---|---|
RSMP | 14/02/2019 | 12:15:59 | AUSER | Fred Smith | A05TCP45 | 1800 | SETROPTS command | SETROPTS RACLIST(XFACILIT) REFRESH |
RSMP | 14/02/2019 | 12:14:15 | BUSER | Dave Jones | A05TCP57 | 1800 | SETROPTS command | SETROPTS GENERIC(DATASET) REFRESH |
RSMP | 14/02/2019 | 12:11:29 | CUSER | Bert Williams | A05TCP34 | 1800 | SETROPTS command | SETROPTS RACLIST(STARTED) REFRESH |
RSMP | 14/02/2019 | 12:09:23 | DUSER | Tina Brown | A05TCP19 | 1800 | SETROPTS command | SETROPTS RACLIST(OPERCMDS) REFRESH |
Column | Description |
---|---|
SYSTEM | System ID from which the record was written |
DATE | Date the command was executed |
TIME | Time the command was executed |
USERID | User ID that issued the command |
USER NAME | Name of the user, if available |
PORT OF ENTRY | Where the command was entered |
EVENT | Internal event type or SMF event and event qualifier Event refers to the SMF event/code qualifier documented in the IBM SMF manuals, or CONS for a |
DESCRIPTION | Command that was entered |
COMMAND IMAGE | Internal event types |
Resources
Click Resources and select one of the following reports to display information about RACF general resources:
- Missing Profiles > OPERCMD
- Missing Profiles > STGADMIN
- Missing Profiles > UNIXPRIV
- Missing Profiles > FACILITY/STGADMIN due to Catch-All Profile
- Missing Profiles > Command Verifier
- Missing Profiles > Certificate
- Certificates > All Profiles
- Certificates > Expiring
- Certificates > Expired
- Misconfigured Settings > CICS SIT
- Misconfigured Settings > IMS
- Misconfigured Settings > DB2
- Misconfigured Settings > MQ
- Software Security Settings > CICS SIT
- Software Security Settings > IMS
- Software Security Settings > DB2
- Software Security Settings > MQ
- Profiles with Inappropriate Audit
- All Profiles
- Global Access Table
Missing Profiles > OPERCMD
Lists all recommended OPERCMD profiles that are missing and should be defined to RACF by the Mainframe Security team:
Class | Profile | Purpose | Recommended |
---|---|---|---|
OPERCMDS | MVS.SET.PROG.** | Modify APF Libraries | Access must be limited to authorized personnel only. Preferably only accessible via Security PAM ids. Should have UACC(NONE) and AUDIT(SUC(READ) FAIL(READ)) |
Column | Description |
---|---|
CLASS | RACF class |
PROFILE | OPERCMDS profile |
PURPOSE | Purpose of the RACF profile |
RECOMMENDED | BMC recommendations |
Missing Profiles > STGADMIN
Lists all recommended STGADMIN profiles that are missing and should be defined to RACF by the Mainframe Security team:
Class | Profile | Purpose | Recommended |
---|---|---|---|
FACILITY | STGADMIN.ADR.CONVERTV | Convert VTOC to SMS | Require READ access to use. Restrict access to this |
FACILITY | STGADMIN.ADR.COPY.BYPASSACS | Copy data sets bypassing ACS routines | Require READ access to use. Restrict access to this |
FACILITY | STGADMIN.ADR.COPY.INCAT | INCAT processing | Require READ access to use. Restrict access to this |
FACILITY | STGADMIN.ADR.COPY.PROCESS.SYS | Copy SYS1 data sets | Require READ access to use. Restrict access to this |
Column | Description |
---|---|
CLASS | RACF class |
PROFILE | STGADMIN profile |
PURPOSE | Purpose of the RACF profile |
RECOMMENDED | BMC recommendations |
Missing Profiles > UNIXPRIV
Lists all recommended UNIXPRIV profiles that are missing and should be defined to RACF by the Mainframe Security team:
Class | Profile | Purpose | Recommended |
---|---|---|---|
UNIXPRIV | SUPERUSER.IPC.RMID | Release IPC resources (ipcrm) | Require READ access to use. Limit to UNIX processes/debuggers |
UNIXPRIV | SUPERUSER.PROCESS.KILL | Issue kill to processes | Require READ access to use. Limit to UNIX processes/debuggers |
UNIXPRIV | SUPERUSER.PROCESS.PTRACE | Use ptrace through dbx debugger | Require READ access to use. Limit to UNIX processes/debuggers |
UNIXPRIV | SUPERUSER.SETPRIORITY | Increase own priority | Require READ access to use. Limit to Storage Admin Group |
Column | Description |
---|---|
CLASS | RACF class |
PROFILE | UNIXPRIV profile |
PURPOSE | Purpose of the RACF profile |
RECOMMENDED | BMC recommendations |
Missing Profiles > FACILITY/STGADMIN due to Catch-All Profile
Lists all missing RACF profiles from classes FACILITY and STGADMIN that are being overlooked due to the UACC being greater than NONE or ID(*) being defined in the access control list (ACL) with access greater than NONE:
Class | Profile | Purpose | Recommended |
---|---|---|---|
FACILITY | STGADMIN.IDC.DIAGNOSE.CATALOG | Run DIAGNOSE command against catalogs | Require READ access to use. Restrict access to this |
FACILITY | STGADMIN.IDC.DIAGNOSE.VVDS | DIAGNOSE command against a VVDS | Require READ access to use. Restrict access to this |
FACILITY | STGADMIN.IDC.EXAMINE.DATASET | Allows use of the IDCAMS EXAMINE command | Require READ access to use. Restrict access to this |
FACILITY | STGADMIN.IGG.ALTER.SMS | Allows Storage Class or Management Class to be altered | Require READ access to use. Restrict access to this |
Column | Description |
---|---|
CLASS | RACF class name |
PROFILE | RACF profile |
PURPOSE | Profile purpose |
RECOMMENDED | BMC recommendations |
Missing Profiles > Command Verifier
Class | CV Profile | Purpose | Recommended |
---|---|---|---|
XFACILIT | C4R.EXEMPT | Allows certain users to be exempt from policy enforcement | If you are installing Command Verifier for the first time, ensure that 1 or 2 users are permitted |
XFACILIT | C4R.USER.ATTR.AUDITOR.** | Prevents system AUDITOR from being granted to users | Very few users should have this access Set default universal access authority (UACC) to NONE. |
XFACILIT | C4R.USER.ATTR.OPERATIONS.** | Prevents system OPERATIONS from being granted to users | Very few users should have this access Set UACC to NONE. |
XFACILIT | C4R.USER.ATTR.SPECIAL.** | Prevents system SPECIAL from being granted to users | Very few users should have this access Set UACC to NONE. |
Column | Description |
---|---|
CLASS | Class name to which the profile belongs |
CV Profile | Command verifier profile |
Purpose | Profile owner |
Recommended | BMC recommendations for this setting |
Missing Profiles > Certificate
Lists all the recommended general resource profiles related to digital certificates that are not defined to RACF:
Class | Missing Profile | Recommended Setting |
---|---|---|
FACILITY | IRR.DIGTCERT.** | Set UACC/ID(*) to NONE. READ allows users to issue the RACDCERT commands for themselves, UPDATE for others and CONTROL for SITE and CERTAUTH certificates |
FACILITY | IRR.DIGTCERT.CHECKCERT | Set UACC/ID(*) to NONE. READ allows users to issue the RACDCERT commands for themselves, UPDATE for others and CONTROL for SITE and CERTAUTH certificates |
Column | Description |
---|---|
CLASS | RACF class |
MISSING PROFILE | Missing RACF profile |
RECOMMENDED SETTING | BMC recommended profile |
Certificates > All Profiles
Lists all general resource profiles related to digital certificates defined to RACF:
Data set Name | Protecting Profile | Owner | UACC | Warning? | Audit S/F | ID(*) | Level | ACL count |
---|---|---|---|---|---|---|---|---|
FACILITY | IRR.DIGTCERT.* | TSGDL | None | N | /R | 0 | ||
FACILITY | IRR.DIGTCERT.ADD | TSGCG | None | N | /R | R | 0 | 7 |
FACILITY | IRR.DIGTCERT.ADDRING | TSGCG | None | N | /R | R | 0 | 7 |
FACILITY | IRR.DIGTCERT.ALTER | TSGCG | None | N | /R | R | 0 | 7 |
Column | Description |
---|---|
CLASS | RACF class |
PROTECTING PROFILE | RACF profile |
OWNER | Profile owner |
UACC | RACF universal ACCess setting |
WARNING? | Whether the WARNING attribute is on |
AUDIT S/F | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
ID(*) | Default access for the profile |
LEVEL | Resource level |
ACL COUNT | Number of users on the access list |
Certificates > Expiring
Lists all digital certificates defined to RACF that are about to expire:
Class | Profile | Remaining | Expiry Date |
---|---|---|---|
DIGTCERT | 00.CN=RSMP?TEST.T=RSS.OU=RSM?PARTNERS?LTD.O=RSM.L=STOKE?POUND.SP=BROMSGROVE.C=GB | 106 | 01/06/2019 |
DIGTCERT | 01.CN=RSMP?TEST.T=RSS.OU=RSM?PARTNERS?LTD.O=RSM.L=STOKE?POUND.SP=BROMSGROVE.C=GB | 106 | 01/06/2019 |
DIGTCERT | 4AA7268B.CN=CA?Receive?Order.OU=CA?Receive?Order | 207 | 10/09/2019 |
DIGTCERT | 00.CN=CKNCA.OU=ZSECURE.O=IBM.C=US | 349 | 30/01/2020 |
Column | Description |
---|---|
CLASS | RACF class |
PROFILE | Profile name |
REMAINING | Number of days until the certificate expires |
EXPIRY DATE | Certificate expiry date |
Certificates > Expired
Lists all digital certificates defined to RACF that have expired:
Class | Profile | Days | Expired date |
---|---|---|---|
DIGTCERT | 01.CN=Root?CA?Test.OU=Technology.O=Test.L=Glasgow.SP=Scotland.C=GB | -99 | 07/11/2018 |
DIGTCERT | 35DEF4CF.OU=Equifax?Secure?Certificate?Authority.O=Equifax.C=US | -176 | 22/08/2018 |
DIGTCERT | 01A3.CN=GTE?CyberTrust?Root.O=GTE?Corporation.C=US | -4739 | 23/02/2006 |
DIGTCERT | 03.CN=GTE?CyberTrust?Root.O=GTE?Corporation.C=US | -4792 | 01/01/2006 |
Column | Description |
---|---|
CLASS | RACF class |
PROFILE | Profile name |
DAYS | Number of days after the certificate expired |
EXPIRED DATE | Date the certificate expired |
Misconfigured Settings > CICS SIT
Lists the security settings defined in the CICS system initialization table (SIT) that conflict with BMC recommendations:
Region | Setting | Current | Recommended | Purpose | Notes |
---|---|---|---|---|---|
CICSTS55 | CONFDATA | Show | HIDETC | Determines whether user data to appear in traces or dumps. This data could be used to penetrate the system. | Default is SHOW. This may have SOX implications |
CICSTS55 | CONFTXT | No | Yes | Determines whether user data to appear in traces or dumps. This data could be used to penetrate the system. | Default is NO VTAM can trace user data. |
CICSTS55 | GMTRAN | CESN | CSGM | Specifies the initial transaction that will be executed. | Default is CSGM. Specify an ATI transaction that will be run. |
CICSTS55 | SECPRFX | No | Yes | This parameter allows for segregation of access to separate regions. CICS will prefix all resource names with the CICS userid ID when talking to the ESM | YES is generally recommended if multiple CICS systems are running. |
Column | Description |
---|---|
Region | CICS region name |
Setting | System name |
Current | Current value |
Recommended | BMC recommended value |
Purpose | Description of the purpose of the setting |
Notes | Supplementary notes regarding the BMC recommendation |
Misconfigured Settings > IMS
Lists the security settings defined in the IMS system initialization table (SIT) that conflict with BMC recommendations:
Region | Setting | Current | Recommended | Purpose | Notes |
---|---|---|---|---|---|
Column | Description |
---|---|
Region | IMS region name |
Setting | System name |
Current | Current value |
Recommended | BMC recommended value |
Purpose | Description of the purpose of the setting |
Notes | Supplementary notes regarding the recommendation |
Misconfigured Settings > DB2
Lists the security settings defined in the DB2 SIT that conflict with BMC recommendations:
System | Region | Setting | Current | Recommended | Purpose | Notes |
---|---|---|---|---|---|---|
Column | Description |
---|---|
System | System name where the DB2 region is running |
Region | Db2 region name |
Setting | System name |
Current | Current value |
Recommended | BMC recommended value |
Purpose | Description of the purpose of the setting |
Notes | Supplementary notes regarding the recommendation |
Misconfigured Settings > MQ
Lists the security settings defined in the MQ SIT that conflict with BMC recommendations:
System | Region | Setting | Current | Recommended | Purpose | Notes |
---|---|---|---|---|---|---|
Column | Description |
---|---|
System | System name where the MQ region is running |
Region | MQ region name |
Setting | System name |
Current | Current value |
Recommended | BMC recommended value |
Purpose | Description of the purpose of the setting |
Notes | Supplementary notes regarding the recommendation |
Software Security Settings > CICS SIT
Lists the security settings defined in the CICS system initialization table (SIT) of each active CICS region:
System | Region | Parameter | Current setting |
---|---|---|---|
RSMP | CICSTS51 | AIEXIT | DFHZATDX |
RSMP | CICSTS51 | APPLIDG | A05CICS1 |
RSMP | CICSTS55 | APPLIDG | A |
Column | Description |
---|---|
SYSTEM | System name where the CICS region is running |
REGION | CICS region name |
PARAMETER | SIT initialization parameter |
CURRENT SETTING | Current setting |
Software Security Settings > IMS
Lists the security settings defined in the IMS SIT of each active IMS region:
System | Region | Parameter | Current setting |
---|---|---|---|
Column | Description |
---|---|
SYSTEM | System name where the IMS region is running |
REGION | IMS region name |
PARAMETER | SIT initialization parameter |
CURRENT SETTING | Current setting |
Software Security Settings > DB2
Lists the security settings defined in the DB2 SIT of each active DB2 region:
System | Region | Parameter | Current setting |
---|---|---|---|
Column | Description |
---|---|
SYSTEM | System name where the IMS region is running |
REGION | IMS region name |
PARAMETER | SIT initialization parameter |
CURRENT SETTING | Current setting |
Software Security Settings > MQ
Lists the security settings defined in the MQ SIT of each active MQ region:
System | Region | Parameter | Current setting |
---|---|---|---|
RSMN | QCBAMSTR | ACTIVE | Yes |
RSMN | QCBAMSTR | ACTIVE | No |
RSMN | QCBAMSTR | ACTIVE | No |
RSMN | QCBAMSTR | ACTIVE | No |
Column | Description |
---|---|
SYSTEM | System name where the MQ region is running |
REGION | MQ region name |
PARAMETER | Parameter name |
CURRENT SETTING | Current setting |
Profiles with Inappropriate Audit
Lists all general resource profiles that do not comply with the recommended audit settings:
Class | Profile | Owner | UACC | Warn | Audit S/F | ID(*) | Level | # on ACL | Cert Start | Cert End |
---|---|---|---|---|---|---|---|---|---|---|
DIGTCERT | 023456.CN=GeoTrust?Global?CA.O=GeoTrust?Inc..C=US | TSGAT | T | N | / | 0 | 21/05/2002 | 21/05/2022 | ||
FACILITY | AOPADMIN | IBMUSER | N | N | /R | 0 | 1 | |||
FACILITY | AP | #OPSMVS | N | N | /R | 0 | 1 | |||
FACILITY | BPX.CONSOLE | TSGSJ | N | N | /R | 0 | 8 |
Column | Description |
---|---|
CLASS | RACF class |
PROFILE | RACF profile |
OWNER | Profile owner |
UACC | Universal ACCess for undefined user IDs |
WARN | Whether the WARNING attribute is on |
AUDIT S/F | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
ID(*) | Default access for defined user IDs |
LEVEL | The level from the RACF profile definition |
# ON ACL | Number of users on the access list (ACL) |
CERT START | Start date if a certificate |
CERT END | End date if a certificate |
All Profiles
Lists all general resource profiles from the recommended RACF classes:
Class | Profile | Owner | UACC | Warn | Audit S/F | ID(*) | Level | on ACL | Cert Start | Cert End |
---|---|---|---|---|---|---|---|---|---|---|
DIGTCERT | 00.CN=CKNCA.OU=ZSECURE.O=IBM.C=US | TSGTS | T | N | / | 0 | 24/05/2018 | 30/01/2020 | ||
FACILITY | AOPADMIN | IBMUSER | N | N | /R | 0 | 1 | |||
FACILITY | AP | #OPSMVS | N | N | /R | 0 | 1 | |||
FACILITY | BPX.CONSOLE | TSGSJ | N | N | /R | 0 | 8 |
Column | Description |
---|---|
CLASS | RACF class |
PROFILE | RACF profile |
OWNER | Profile owner |
UACC | Universal ACCess for undefined user IDs |
WARN | Whether the WARNING attribute is on |
AUDIT S/F | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
ID(*) | Default access for defined user IDs |
LEVEL | Level from the RACF profile definition |
| Number of users on the access list (ACL) |
CERT START | Start date if a certificate |
CERT END | End date if a certificate |
Global Access Table
Lists all RACF definitions defined in the Global Access Table (GAT):
Class | Profile | Entry | Access |
---|---|---|---|
GLOBAL | DATASET | &RACUID.** | A |
GLOBAL | DATASET | SYS1.** | R |
GLOBAL | DATASET | SYS1.HELP | R |
GLOBAL | DATASET | SYS1.MARK | R |
Column | Description |
---|---|
CLASS | RACF class – GLOBAL |
PROFILE | RACF profile type |
ENTRY | Global table entry member |
ACCESS | Global access:
|
:
System Settings
Click System Settings and select one of the following reports to display information about your RACF and z/OS environment:
- PPT > Entries Specifying NOPASS
- PPT > Entries Defined as NOSWAP
- Misconfigured Settings
- All Settings
- STC Entries with Unprotected User ID
- Inactive Monitored Jobs
PPT > Entries Specifying NOPASS
Lists all Program Properties Table (PPT) entries that have NOPASS specified in z/OS PARMLIB member SCHEDxx:
System | Program |
---|---|
RSMP | EPWINIT |
Column | Description |
---|---|
SYSTEM | System name |
PROGRAM | Program that has NOPASS in the PPT |
PPT > Entries Defined as NOSWAP
Lists all Program Properties Table (PPT) entries that have NOSWAP defined in z/OS PARMLIB member SCHEDxx:
System | Program | Key |
---|---|---|
RSMP | AZFSTCMN | 2 |
RSMP | BNJLINTX | 8 |
RSMP | BPEINI00 | 7 |
RSMP | BPXBATA2 | 2 |
Column | Description |
---|---|
SYSTEM | System name |
PROGRAM | Program name in the PPT |
KEY | MVS storage protect key that the program runs under and has been defined in the MVS PPT |
Misconfigured Settings
Lists all RACF and z/OS settings that are potential vulnerabilities on your system:
System | Type | Setting | Current Value | Recommended | Description | Notes |
---|---|---|---|---|---|---|
RSMP | PASSWORD | INTERVAL | 30 | 90 | Number of days before user must change password (1-254). | Specify as PASSWORD( INTERVAL(nn)). nn should be <=90 |
RSMP | PASSWORD | MINCHANGE | 0 | 1 | Number of days before user can change password again (0-254). | Specify as PASSWORD(MINCHANGE(nn)). nn should be >=1 |
RSMP | SETROPTS | APPLAUDIT | NOAPPLAUDIT | APPLAUDIT | Enables auditing of APPC transactions | Set as APPLAUDIT |
RSMP | SETROPTS | GENERICOWNER | NOGENERICOWNER | GENERICOWNER | Restricts creation of more specific undercutting profiles | Specify GENERICOWNER |
Column | Description |
---|---|
SYSTEM | System LPAR name |
TYPE | Setting type Type is either 'SETROPTS', 'PASSWORD', 'SMF' or 'SYSTEM' and |
SETTING | Setting name |
CURRENT VALUE | Current value of the setting from storage |
RECOMMENDED | Recommended setting |
DESCRIPTION | Description of the setting |
NOTES | Notes and recommendations |
All Settings
System | Type | Setting | Current Value |
---|---|---|---|
RSMN | PASSWORD | HISTORY | 6 |
RSMN | PASSWORD | INTERVAL | 30 |
RSMN | PASSWORD | MINCHANGE | 0 |
RSMN | PASSWORD | MIXEDCASE | MIXEDCASE |
Column | Description |
---|---|
SYSTEM | System name |
TYPE | Setting type |
SETTING | Setting name |
CURRENT VALUE | Current value of the setting from storage |
STC Entries with Unprotected User ID
Lists all started tasks defined to RACF that have unprotected user IDs:
System | Profile | Stuser | Stgroup | Privileged | Trusted | Traced |
---|---|---|---|---|---|---|
LPAR1 | BPXAS.* | OMVSKERN | OMVSGRP | |||
LPAR1 | FTPD.* | FTPD | ||||
LPAR2 | TCPIP.* | TCPIP | OMVSGRP | Yes | ||
LPAR3 | TN3270.* | TN3270 | OMVSGRP | Yes |
Column | Description |
---|---|
SYSTEM | System name |
PROFILE | Started task profile name |
STUSER | Started task user IDs associated with the profile |
STGROUP | Started task group associated with the profile |
PRIVILEGED | Whether the task is privileged |
TRUSTED | Whether the task is trusted |
TRACED | Whether the task is traced |
Inactive Monitored Jobs
Lists all jobs marked for monitoring in Security Policy Manager that are not currently running:
System | Job not running |
---|---|
RSMP | RSSTAM |
RSMP | CICSTS42 |
Column | Description |
---|---|
SYSTEM | System name |
JOB NOT RUNNING | Name of the monitored job that appears not to be running |
Users
Click Users and select one of the following reports to display information about RACF users:
- Specific User Activity
- Weak Passwords
- Special and Audit
- Operations
- No Password Interval
- UID(0)
- Not used for 90 days
- IBMUSER Not Revoked
- Revoked Special Users
- Duplicate Names
- File Transfers
Specific User Activity
With the Specific User Activity report, you can fetch information about a specific user. Select the report, enter the user ID you want to query, and click Submit.
The report lists detailed user activity, as displayed in the following example:
Weak Passwords
Lists all RACF users that have weak passwords defined:
Userid | Name | Default Group | Special | Operations | Password Security Level | Generations |
---|---|---|---|---|---|---|
AUSER | Tina Smith | GRPAUSR | Y | 1 | 4 | |
BUSER | Fred Brown | GRPAUSR | 1 | 2 | ||
CUSER | Ann Williams | GRPAUSR | 3 | 6 | ||
DUSER | Dave Jones | GRPAUSR | Y | 2 | 2 |
Column | Description |
---|---|
USERID | User ID |
NAME | Associated name, if available |
DEFAULT GROUP | User ID default group |
SPECIAL | Whether the user has the SPECIAL attribute set |
OPERATIONS | Whether the user has the OPERATIONS attribute set |
PASSWORD SECURITY LEVEL | Type of weak password detected Contact BMC Support for details. |
GENERATIONS | Number of passwords in the password history You can also show if the account has ever been used. |
Special and Audit
Lists all RACF users that have system special and system audit attributes:
Userid | Name | Default Group | Special | Operations | Auditor |
---|---|---|---|---|---|
AUSER | Austin Smith | #RSM | Y | Y | |
BUSER | George Brown | #RSM | Y | Y | Y |
CUSER | Janet Williams | #RSM | Y | Y | Y |
DUSER | Mary White | #RSM | Y | Y | Y |
Column | Description |
---|---|
USERID | User ID |
NAME | Associated name, if available |
DEFAULT GROUP | User ID's default group |
SPECIAL | Whether the user has the SPECIAL attribute set |
OPERATIONS | Whether the user has the OPERATIONS attribute set |
AUDITOR | Whether the user has the AUDITOR attribute set |
Operations
Lists all RACF users that have system operations attributes:
Userid | Name | Default Group | Special | Operations | Auditor |
---|---|---|---|---|---|
BATCH01 | BATCH PROCESSING | SYS1 | Y | ||
RSS | RSS STARTED TASK | #RSM | Y | Y | |
AUSER | Bert Wilson | #RSM | Y | Y | Y |
BUSER | Fredda Mayflower | #RSM | Y | Y | Y |
Column | Description |
---|---|
USERID | User ID |
NAME | Associated name, if available |
DEFAULT GROUP | User ID's default group |
SPECIAL | Whether the user has the SPECIAL attribute set |
OPERATIONS | Whether the user has the OPERATIONS attribute set |
AUDITOR | Whether the user has the AUDITOR attribute set |
No Password Interval
Lists all RACF users that do not have a password interval defined:
Userid | Name | Default Group | Special | Operations | Auditor |
---|---|---|---|---|---|
AUSER | Ernie Brown | #RSM | |||
BUSER | Phill Smith | #RSM | Y | ||
CUSER | Joe Smith | #RSM | Y | ||
DUSER | Sue Wilson | #RSM | Y | Y | Y |
Column | Description |
---|---|
USERID | User ID |
NAME | Associated name, if available |
DEFAULT GROUP | User ID's default group |
SPECIAL | Whether the user has the SPECIAL attribute set |
OPERATIONS | Whether the user has the OPERATIONS attribute set |
AUDITOR | Whether the user has the AUDITOR attribute set |
UID(0)
Lists all RACF users that have UID(0) defined, that is, superuser attribute in Unix System Services (USS):
Userid | Name | Default Group | Special | Operations | Auditor |
---|---|---|---|---|---|
ADCDMST | ADCD MASTER | SYS1 | |||
BATCH01 | BATCH PROCESSING | SYS1 | Y | ||
BPXOINIT | BPXOINIT | SYS1 | |||
AUSER | Brian Small | #RSM | Y |
Column | Description |
---|---|
USERID | User ID |
NAME | Associated name, if available |
DEFAULT GROUP | User ID's default group |
SPECIAL | Whether the user has the SPECIAL attribute set |
OPERATIONS | Whether the user has the OPERATIONS attribute set |
AUDITOR | Whether the user has the AUDITOR attribute set |
Not used for 90 days
Lists all RACF users that have not been used for the past 90 days:
Userid | Name | Default Group | Special | Operations | Auditor | Last connect date | Not used x days |
---|---|---|---|---|---|---|---|
ADCDMST | ADCD MASTER | SYS1 | 17-Oct-12 | 2311 | |||
ADCDN | ADCDN | TEST | 06-Nov-08 | 3752 | |||
ADCDO | ADCDO | TEST | 06-Nov-08 | 3752 | |||
ADCDP | ADCDP | TEST | 06-Nov-08 | 3752 |
Column | Description |
---|---|
USERID | User ID |
NAME | Associated name, if available |
DEFAULT GROUP | User ID's default group |
SPECIAL | Whether the user has the SPECIAL attribute set |
OPERATIONS | Whether the user has the OPERATIONS attribute set |
AUDITOR | Whether the user has the AUDITOR attribute set |
LAST CONNECT DATE | Date the user last connected |
NOT USED X DAYS | Number of days since last use |
IBMUSER Not Revoked
Lists IBMUSER details if it does not have the Revoked attribute:
Userid | Name | Default Group | Special | Operations | Auditor | Last connect date | Not used x days |
---|---|---|---|---|---|---|---|
Column | Description |
---|---|
USERID | User ID, IBMUSER |
NAME | Associated name, if available |
DEFAULT GROUP | IBMUSER's default group |
SPECIAL | Whether the user has the SPECIAL attribute set |
OPERATIONS | Whether the user has the OPERATIONS attribute set |
AUDITOR | Whether the user has the AUDITOR attribute set |
LAST CONNECT DATE | Date the IBMUSER last connected |
NOT USED X DAYS | Number of days since last use |
Revoked Special Users
Lists all RACF system special users with the Revoked attribute:
Userid | Name | Default Group | Special | Operations | Auditor | Last connect date | Not used x days |
---|---|---|---|---|---|---|---|
AUSER | June Smith | PMIUSER | Y | 13-Mar-13 | 2164 | ||
BUSER | Peter Brown | PMIUSER | Y | 20-Oct-10 | 3039 | ||
CUSER | Charlie White | #RSM | Y | 26-Jun-18 | 233 | ||
DUSER | John Wilson | #RSM | Y | 26-Jun-18 | 233 |
Column | Description |
---|---|
USERID | User ID |
NAME | Associated name, if available |
DEFAULT GROUP | User ID's default group |
SPECIAL | Whether the user has the SPECIAL attribute set |
OPERATIONS | Whether the user has the OPERATIONS attribute set |
AUDITOR | Whether the user has the AUDITOR attribute set |
LAST CONNECT DATE | Date the user last connected |
NOT USED X DAYS | Number of days since last use |
Duplicate Names
Lists all RACF users that have the same name defined in field 'Name':
Userid | Duplicated name | Default Group | Owner | Password Interval | Last use | Passwords in History | Revoke Count | Installation Data |
---|---|---|---|---|---|---|---|---|
AUTALERT | AUTOOPERATOR | INGAUTO | TSGTS | 30 | 11-Oct-16 | 0 | 0 | AUTOMATION AUTOTASK: USED FOR ALERT BASED NO |
BLZ400 | DSN PROFILE ID | #RSM | #RSM | 30 | 27-Mar-18 | 0 | 0 | GENERAL DATASET PROFILE ID |
BPXROOT | RUI FEIO NO 2 | #RSM | #RSM | 30 | 29-Jun-18 | 0 | 0 | 123456 |
C2PSUSE2 | ZSECURE ALERT STC | SYSAUDIT | SYSAUDIT | 30 | 13-Oct-15 | 0 | 0 |
Column | Description |
---|---|
USERID | User ID |
DUPLICATED NAME | Name that is duplicated |
DEFAULT GROUP | Default RACF group (DFLTGRP) |
OWNER | Owner |
PASSWORD INTERVAL | User ID's password interval |
LAST USE | Date of last use |
PASSWORDS IN HISTORY | Number of passwords in the password history for this user |
REVOKE COUNT | Number of unsuccessful password attempts |
INSTALLATION DATA | Displays any INSTDATA |
File Transfers
Date | Time | System | User | Action | Program | Dataset | Jobname |
---|---|---|---|---|---|---|---|
Column | Description |
---|---|
DATE | Date the file transfer was run |
TIME | Time the file transfer was run |
SYSTEM | System the file transfer was run from |
USER | User ID performing the file transfer |
ACTION | Send or receive |
PROGRAM | Name of the program used to transfer the file |
DATASET | Name of the data set that was transferred |
JOBNAME | Name of the job that ran the file transfer |
Compliance
Click Compliance and select one of the following reports to display information about security violations detected in the z/OS environment:
Access Violations
Lists all security access violations detected in your z/OS environment:
System | Date | Time | Userid | Name | Class | Resource | Volser | Intent | Allowed |
---|---|---|---|---|---|---|---|---|---|
RSMP | 19/02/2019 | 14:29:14 | RSS | RSS STARTED TASK | MQCMDS | QCBA.DISPLAY.SECURITY | Read | None | |
RSMP | 19/02/2019 | 14:29:14 | RSS | RSS STARTED TASK | MQCMDS | QCBB.DISPLAY.SECURITY | Read | None | |
RSMP | 19/02/2019 | 14:00:16 | RSSCHIP | RSS STARTED TASK | MQCMDS | QCBA.DISPLAY.SECURITY | Read | None | |
RSMP | 19/02/2019 | 14:00:16 | RSSCHIP | RSS STARTED TASK | MQCMDS | QCBA.DISPLAY.ARCHIVE | Read | None |
Column | Description |
---|---|
SYSTEM | System where the violation was detected |
DATE | Event date |
TIME | Event time |
USERID | User ID who caused the violation |
NAME | User ID's name |
CLASS | Class of the resource that generated the violation |
RESOURCE | Resource that generated the violation |
VOLSER | Volume serial number if appropriate |
INTENT | Access intent |
ALLOWED | Access allowed |
Allowlists
Many of the Security Policy Manager queries can exclude results by using allowlists. Allowlists are defined in the index member of the rules data set and consist of exceptions that can be used to prevent specific users or resources from being reported on as non-compliant.
For example, if only one user ID is allowed to update APF libraries, then an allowlist containing that one user ID can be defined, and the compliance query can specify a clause such as:
AND userid NOT IN (SELECT userid FROM allowlist WHERE type='APF')
The allowlist defined would be:
Allowlist APF
TSGAPF Userid allowed to update APF data sets.
For an example of the alllowlist, see Sample-index-member.
Compliance Reports
Select Overview to see the Compliance Overview dashboard that is described in Logging-on-and-viewing-compliance-summaries.
Select All to see all the compliance reports defined on the system, including all policies contained in the index member, their last run time, next run time, and result of the run. For more information, see "Examining all compliance reports" and "To run individual reports" in Logging-on-and-viewing-compliance-summaries.
Select one of the following report categories:
- DISA STIG
- MVS
- DB2
- RACF
- TSS
- USS
- TCP/IP
- CICS
- REXX
The list of categories might change, depending on your system configuration.
If you add a custom category to the HLQ.RULES(INDEX) member and update the rules with the /f stc, loadrules command (or restart the product), the custom category is displayed in the Compliance menu and in the All Compliance Reports table. For an example of the index member, see Sample-index-member.
RACF
Click RACF and select one of the following reports to display information about issues on your RACF environment:
- Profiles with > UACC > None
- Profiles with > ID(*) > None
- Profiles with > Warning
- Profiles with > Empty ACL
- Groups > Owner Not Supgroup
- Groups > Universal Settings
Profiles with > UACC > None
Lists all RACF data set and general resource profiles with universal access (UACC) greater than NONE:
Class | Profile | Owner | UACC | ID(*) | Warning | S/F Audit | Level |
---|---|---|---|---|---|---|---|
APPL | FEKAPPL | TSGSJ | Read | N | /R | 0 | |
APPL | GPMSERVE | TSGSJ | Read | N | /R | 0 | |
APPL | GPM4CIM | TSGSJ | Read | N | /R | 0 | |
CSFSERV | CSF%%C | TSGMK | Read | N | /R | 0 |
Column | Description |
---|---|
CLASS | RACF class |
PROFILE | RACF Profile |
OWNER | Profile owner |
UACC | Universal ACCess setting for the profile |
ID(*) | ID(*) setting for the profile. |
WARNING | Whether the WARNING attribute is on |
S/F AUDIT | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
LEVEL | Profile level |
Profiles with > ID(*) > None
Lists all RACF data set and general resource profiles with ID(*) defined in the access control list (ACL) with access greater than NONE:
Class | Profile | Owner | UACC | ID(*) | Warning | S/F Audit | Level |
---|---|---|---|---|---|---|---|
ACCTNUM | ACCT# | IBMUSER | None | Read | N | /R | 0 |
CCICSCMD | ** | TSGMW | None | Read | N | /R | 0 |
DATASET | ADCD.** | #RSM | None | Read | N | /R | 0 |
DATASET | AFF260.** | #RSM | None | Read | N | /R | 0 |
Column | Description |
---|---|
CLASS | RACF class |
PROFILE | RACF profile |
OWNER | Profile owner |
UACC | Universal ACCess setting for the profile |
ID(*) | ID(*) setting for the profile |
WARNING | Whether the WARNING attribute is on |
S/F AUDIT | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
LEVEL | Profile level |
Profiles with > Warning
Lists all RACF data set and general resource profiles in WARNING mode:
Class | Profile | Owner | UACC | ID(*) | Warning | S/F Audit | Level |
---|---|---|---|---|---|---|---|
DATASET | ISVR.RSS.** | #RSM | Read | Update | Y | R/R | 0 |
DATASET | ISVR.RSS.SUE.** | #RSM | Read | Read | Y | R/R | 99 |
DATASET | SYS1.PARMLIB | TSGMW | None | Read | Y | /R | 90 |
DATASET | TSGAF.CARLA.EXER.** | #RSM | Alter | Y | /R | 0 |
Column | Description |
---|---|
CLASS | RACF class |
PROFILE | RACF profile |
OWNER | Profile owner |
UACC | Universal ACCess setting for the profile |
ID(*) | ID(*) setting for the profile |
WARNING | Whether the WARNING attribute is on |
S/F AUDIT | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
LEVEL | The profile level. |
Profiles with > Empty ACL
Lists all RACF data set and general resource profiles with no users or groups defined in the access control list (ACL):
Class | Profile | Owner | UACC | ID(*) | Warning | S/F Audit | Level |
---|---|---|---|---|---|---|---|
ACCTNUM | RSMTST | SYS1 | None | N | /R | 0 | |
APPL | #OPSMVS | #OPSMVS | None | N | /R | 0 | |
APPL | CICSTS3* | TSGMW | None | N | /R | 0 | |
CDT | #TESEMP | SYS1 | None | N | /R | 0 |
Column | Description |
---|---|
CLASS | RACF class |
PROFILE | RACF profile |
OWNER | Profile owner |
UACC | Universal ACCess setting for the profile |
ID(*) | ID(*) setting for the profile |
WARNING | Whether the WARNING attribute is on |
S/F AUDIT | Audit successes and failures The audit levels can have the following values:
For example, U/R is equal to Success(Update)/Failures(Read). |
LEVEL | Profile level |
Groups > Owner Not Supgroup
Lists all RACF groups where the superior group (SupGroup) is different from the owner:
Group | Owner | Supgroup | #Sub Groups | #Users | Creation Date YYYY/MM/DD | Installation Data | Universal Group? | UACC | Notermuacc? | ACL Count |
---|---|---|---|---|---|---|---|---|---|---|
#EPSINC | TSGMK | SYS1 | 01/05/2018 | N | NONE | 5 | ||||
#TIVOMAD | TSGHS | SYS1 | 07/08/2018 | TIVOLI OUTPUT MANAGER ADMIN | N | NONE | 3 | |||
$JMLMAST | TSGNJC | #RSM | 16/02/2018 | N | NONE | 3 | ||||
$JMLTEMP | TSGNJC | #RSM | 16/02/2018 | N | NONE | 1 |
Column | Description |
---|---|
GROUP | RACF group name |
OWNER | Group owner |
SUPGROUP | Group's superior group |
#SUB GROUPS | Number of subgroups connected to this group |
#USERS | Total connects to this group |
CREATION DATE YYYY/MM/DD | Group creation date |
INSTALLATION DATA | Group's INSTDATA setting |
UNIVERSAL GROUP? | Whether it is a universal group |
UACC | Group's Universal ACCess setting |
NOTERMUACC | NOTERMUACCC value |
ACL COUNT | Count of connected users |
Groups > Universal Settings
Lists all Universal groups defined to RACF:
Group | Owner | Supgroup | #Sub Groups | #Users | Creation Date | Installation Data | UACC | Notermuacc? | ACL Count |
---|---|---|---|---|---|---|---|---|---|
#TEST | #RSM | #RSM | 20111031 | NONE | 2 | ||||
#TEST2 | #RSM | #RSM | 20111101 | NONE | 1 | ||||
SUBZSEC | ZSECURE | ZSECURE | 20171018 | NONE | |||||
TESTUNIV | #RSM | #RSM | 20130918 | UNIVSAL TEST GROUP | NONE |
Column | Description |
---|---|
GROUP | RACF group name |
OWNER | Group owner |
SUPGROUP | Group's superior group |
#SUB GROUPS | Number of subgroups connected to this group |
#USERS | Total connects to this group |
CREATION DATE | Group creation date |
INSTALLATION DATA | Whether it is a universal group |
UACC | Group's Universal ACCess setting |
NOTERMUACC? | NOTERMUACCC value |
ACL COUNT | Count of connected users |