Previous Topic

Next Topic

Book Contents

Book Index

Step 2. RACF Security Definition Samples

Step 2.1 ControlM/Tape Security Definitions (optional)

Select this step to edit the CTTSRAC2 member in the IOA INSTWORK library.

Perform the following steps to define the required permissions.

  1. Associate users with Extended Definition Mode.
    1. To define the entity $$CTTEDM.qname, use the following command:

      RDEFINE FACILITY $$CTTEDM.qname UACC(NONE)

    2. To authorize USERA to Extended Definition mode, use the following command:

      PERMIT $$CTTEDM.qname ID(USERA) CLASS(FACILITY) ACCESS(READ)

    3. Submit the job for execution.

      This job must be run under an administrator user ID who has authorization to enter these commands.

    4. Scan the output of the job for information and error messages produced. All job steps must end with a condition code of 0.
  2. Define entities and user authorizations.

    For information about entities and user authorizations, see Control-M/Tape Basic Definition Security Callsand Control-M/Tape Extended Definition Security Calls.

    Example

    To authorize USERA access to a given Control‑M/Tape entity, use the following command:

    PERMIT $$CTTnnn.qname CLASS(FACILITY) ID(USERA) ACCESS(READ)

    where CTTnnn is the name of the Control‑M/Tape entity to be accessed.

    All entity names for each Control‑M/Tape protected element appear in Control-M/Tape Basic Definition Security Calls for Basic Definition mode and Control-M/Tape Extended Definition Security Calls for Extended Definition mode.

Step 2.2 Functions Security Definitions (Optional)

Select this step to edit the CTTSRAC3 member in the IOA INSTWORK library. This member contains definition samples for the various Control‑M/Tape entities. Modify the definitions according to the requirements of the site and submit the job.

Step 2.3 Control Program Access to Datasets (Optional)

Select this step to edit the CTTSRAC4 member in the IOA INSTWORK library. This member contains a sample of the definitions required to define Program Pathing access authorizations to Control‑M/Tape datasets. Review the definitions and modify to meet the requirements of your site.

WARNING: BMC recommends that the security administrator first read Limiting Access to Specific Programs.

Parent Topic

Implementing Control-M/Tape Security