Creating and defining the started task
To create the started task
Create the STC user ID with the following characteristics:
- TSO ID that is less than eight characters
- PROTECTED parameter
- OMVS segment
- Access to the database directory that you created in Updating the global RSS parameters
Additionally, grant the following permissions to the STC user for SPM to have full functionality:
- CLASS OPERCMDS - MVS.MCSOPER.* (READ)
- CLASS OPERCMDS - MVS.DISPLAY.* (READ)
- CLASS MQCMDS - \[MQsubsystemName\].Display.** (READ)
- CLASS MQCMDS - \[MQSubsystemName\].Security.** (READ)
- CLASS UNIXPRIV - SUPERUSER.FILESYS (READ)
With these authorities, the started task can initialize without security issues. If you encounter access errors on startup, contact BMC Support.
To define the started task to RACF
(SPE2501)When you define the user associated with the SPM task, you need to configure the started task definition for the environment where you are running SPM.
To make sure that SPM can read through the entire UNIX file system, scan USS files, and detect anomalies, perform either of the following steps:
- Grant the SPM STC user ID READ access to the UNIXPRIV class SUPERUSER.FILESYS
- Assign the TRUSTED attribute to the STARTED class profile created for SPM
Use the following commands to define the SPM started task to RACF:
CONNECT <stcUser> GROUP(<groupName>) OWNER(<owner>) AUTH(USE) UACC(NONE)
RDEFINE STARTED <spmSTCname>.* STDATA(USER(<stcUser>) TRUSTED)
RDEFINE STARTED <masterSTCname>.* STDATA(USER(<stcUser>) TRUSTED)
SETROPTS REFRESH RACLIST(STARTED)
ALTUSER <stcUser> OMVS(HOME('<pathName>'))
ALTUSER <stcUser> OMVS(PROGRAM('/bin/sh'))
ALTUSER <stcUser> OMVS(UID(<uidNumber>))
PE IRR.DIGTCERT.LIST CL(FACILITY) ID(stcUser) AC(CONTROL)
Replace the following placeholders:
- <stcUser>—RACF user ID under which the SPM started task runs
- <owner>—RACF owner for the resource
- <groupName>—RACF group name to which the RACF user ID belongs
- <userID>—RACF user identifier that is granted access to SPM
- <spmSTCname>—Name of the SPM procedure (for example, BASPMS)
- <masterSTCname>—Name of the SPM master address space (for example, BASPMM)
- <pathName>—USS home directory for the stcUser
To define the started task to Top Secret
Use the following syntax as a guide to make sure that the BMC AMI Security Policy Manager started task has the correct Top Secret authorities:
TSS ADD(BASPM) GROUP(<stcGroupName>) UID(<uidNumber>)
TSS ADD(BASPM) GROUP(OMVSGRP) DFLTGRP(OMVSGRP)
TSS ADDTO(BASPM) HOME(/u/baspm)OMVSPGM(/bin/sh)
TSS ADD(STC) PROCNAME(<spmMasterAddressSpaceName>) ACID(BASPM)
TSS ADD(STC) PROCNAME(<spmAddressSpaceName>) ACID(BASPM)
TSS PERMIT(BASPM)CASECAUT(TSSUTILITY.TSSCFILE) ACCESS(USE)
TSS ADMIN(BASPM) RESOURCE(AUDIT,REPORT,INFO)MISC9(GENERIC) ACID(AUDIT,REPORT,INFO)DATA(ALL, PROFILE) MISC8(ALL)
TSS ADDTO(BASPM) FAC(STC)
TSS ADMIN(BASPM) MISC4(CERTLIST)
Replace the following placeholders:
- <stcGroupName>—Started task command group name
- <uidNumber>—User identifier value in the OMVS segment
- <spmMasterAddressSpaceName>—Name of the SPM master address space
- <spmAddressSpaceName>—Name of the SPM address space
To define the ACF2 started task
Use the following syntax as a guide to make sure that the BMC AMI Security Policy Manager started task has the correct ACF2 authorities:
INSERT <stcUserId> NAME(BMC AMI Security Policy Manager) ACCOUNT AUDIT RESTRICT –
SECURITY TSO GROUP(<omvsGroup>) PREFIX(RSS) CONSOLE JCL –
OPERATOR PROMPT HOME(/u/baspm) OMVSPGM(/bin/sh) –
UID(<uid>) RULEVLD RSRCVLDReplace the following placeholders:
- <stcUserId>—ACF2 logon ID for the started task
- <omvsGroup>—OMVS group name
- <uid>—ACF2 UID string
Select TSO option 6 and set the following global system options (GSO) record:
ACF
SET CONTROL(GSO)
INSERT STC GROUP(OMVSGRP) LOGONID(<stcUserId>) STCID(<stcName>)
F ACF2,REFRESH(STC)Replace the following placeholders:
- <stcUserId>—ACF2 logon ID for the started task
- <stcName>—Started task name
- Set up the logon ID for the RSS STCs because they create USS processes and retain all privileges.
This does not happen if the logon ID is set up with the STC privilege instead of an STC GSO record. Set the following general resource access:
$KEY(BPX) TYPE(FAC)
CONSOLE UID(<stcUserId>) ALLOW
SUPERUSER UID(<stcUserId>) ALLOW
$KEY(IRR) TYPE(FAC)
RADMIN UID(<stcUserId>) ALLOW
DIGTCERT.LIST UID(<rssUIDstring>) ALLOWReplace the <stcUserId> placeholder with the ACF2 logon ID for the started task.
- Under ACF2 operator commands (OPERCMDS), restrict the MVS.MODIFY.STC.RSSSPM.RSSSPM resource to authorized users who maintain the software.
The ACF2 logon ID for the started task requires access to the SDSF resource, ISF.CONNECT.**, and all SDSF display commands.