Previous Topic

Next Topic

Book Contents

Book Index

Step 2. RACF Security Definitions (Optional)

Note: To activate the IOA to XBM interface, XBM must be active and at least one of the following parameters: ZIIPXBMO, ZIIPXBMP, or ZIIPXBMA must be set to Y.

A RACF call is made by XBM on the initial request to determine if a user is authorized to perform the requested function. The following RACF profile is used:

BMCXBM.<XBM_SSID>.ZIIP

If this profile is not defined, permission will be granted. More detailed information can be found in the XBM documentation.

Step 2.1 Control-D Security Definitions

Select this step to edit member CTDSRAC2 in the IOA INSTWORK library

Perform the following steps to define the required permissions:

  1. Associating users with Extended Definition mode.
    1. Add the following commands to define the $$CTDEDM entity and authorize users to use this entity.
    2. Define the entity $$CTDEDM.qname as follows:

      RDEFINE FACILITY $$CTDEDM.qname UACC(NONE)

    3. Authorize USERA to Extended Definition mode as follows:

      PERMIT $$CTDEDM.qname ID(USERA) CLASS(FACILITY) ACCESS(READ)

  2. Submit the job for execution.

    This job must be run under a user who has authorization to enter these commands.

    Scan the output of the job for information and error messages. All job steps must end with a condition code of 0.

Step 2.2 Function Security Definitions

Select this step to edit the CTDSRAC3 member in the IOA INSTWORK library. This job contains various definitions for Control‑D. Review the definitions and modify according to your site's requirements.

Step 2.3 Control Program Access to Datasets

Select this step to edit the CTDSRAC4 member in the IOA INSTWORK library. This member contains a sample of the definitions required to define Program Pathing access authorizations to Control‑D datasets.

Review the definitions and modify according to the requirements of your site.

WARNING: BMC recommends that the security administrator first read Limiting Access to Specific Programs and the IBM Resource Access Control Facility Security Administrator’s Guide before submitting this job.

Parent Topic

Implementing Control-D and Control-V Security