Previous Topic

Next Topic

Book Contents

Book Index

Step 7.2 Security Definitions (Sample)

To define CTMAS security, edit the ECSSTSS2 member in the IOA INSTWORK library and customize it as follows.

CTMAS security uses the IOASE07 and IOASE32 IOA security modules, as well as the CTMSE08 Control‑M security module, when IOA and Control‑M security interfaces are installed. Therefore, to complete CTMAS security, only the required definitions are necessary.

  1. Define CTMAS ACID to TopSecret.
    1. Change the value of parameter DEPT from sec‑administrator‑dept to the appropriate ACID:

      TSS CRE (CTMAS) NAME (...) DEPT(sec‑administrator‑dept)

    2. Define the CTMAS started task to TopSecret.

      Change the ACID definition in the following command to the appropriate ACID:

      TSS ADD(STC) PROC(CTMAS) ACID(CTMAS)

    3. Allow CTMAS ACID to access IOA datasets.

      Authorizations to access IOA datasets are optionally defined during the IOA installation process. This step must be completed before proceeding with security implementation. For information about how to grant users access to IOA datasets, see the IOA Installation chapter of the INCONTROL for z/OS Installation Guide: Installing.

    4. Connect the appropriate profile to the CTMAS ACID in the following command:

      TSS ADD (CTMAS) PROF (profile‑name)

  2. Give CTMAS READ access authority to any datasets that are accessed by workstation users.
    1. Define IOA entities and user authorizations to TopSecret

      For information about how to define Control‑M/Enterprise Manager entities and user authorizations to TopSecret, see Basic Definition Security Calls, and Extended Definition Security Calls.

    2. Modify the following command to establish ownership of the resources in TopSecret to the appropriate owner:

      TSS ADD(sec‑administrator‑dept) IBMFAC($$ECS)

    For samples of user authorizations, see member ECSSTSS3 in the IOA INSTWORK library.

    All entity names for each CTMAS protected element are described in CTMAS Basic Definition Security Calls , for Basic Definition mode and in CTMAS Extended Definition Security Calls, for Extended Definition mode.

    1. Authorize the CTMAS installer to use CTMAS facilities.

      Customize the following command to authorize USERA access to the Online monitor:

      TSS ADD(USERA) FACILITY(CTW)

    2. Modify USERA to the user ID of the CTMAS installer.

      Customize the following command to authorize the CTMAS installer to use CTMAS facilities:

      TSS PERMIT(USERA) IBMFAC($$ECS) ACC(READ)

  3. Submit the job

    Submit the job and verify that all steps complete with a condition code of zero. Run this job under the ACID of the general security administrator (SCA) who has authorization to enter these TopSecret commands.

  4. Verify that all job steps end with a condition code of 4 or less.

Parent Topic

Step 7. Control-M Application Server - TopSecret