Please enable JavaScript to view this site.

Navigation: Utilities > SQDCONF > Operational Considerations

z/OS Security Options

Scroll

Execution of the SQDconf Utility can be managed at the Command level using the z/OS System Authorization Facility (SAF).

The z/OS System Authorization Facility (SAF) utilizes Classes to identify and define Objects to be managed and the Resources associated with those objects. It also supports the creation of Groups of users with common privileges. Implementation of Connect CDC SQData SAF security requires a dynamic class descriptor table (CDT) class, SQDATA0, first be defined. Groups can then be created that grant specific privileges to authorized users of the resources.

Note, the rules and examples are expressed in terms of RACF.

The following required steps must be followed in sequence to define and activate the SQDATA0 class:

1.  Define SQDATA0 class in the dynamic CDT

RDEFINE CDT SQDATA0 UACC(NONE) +

   CDTINFO(DEFAULTUACC(NONE) CASE(UPPER) FIRST(ALPHA,SPECIAL) +

           OTHER(ALPHA,NATIONAL,NUMERIC,SPECIAL) +

           MAXLENGTH(246) MAXLENX(246) +

           GENERIC(ALLOWED) RACLIST(ALLOWED) +

           POSIT(<posit_number>)) +

   DATA('SQDATA RESOURCE PROFILE CLASS')

 

Note, the POSIT number <nnn> used must be unique and not currently in use.

2.  Refresh the CDT class

SETROPTS RACLIST(CDT) REFRESH

3.  Activate the new SQDATA0 class

SETROPTS CLASSACT(SQDATA0) RACLIST(SQDATA0)

SETROPTS GENERIC(SQDATA0)

 

4.  Create user Groups

Two user Groups for the SQDATA0 Class should be created; one for SQData product administrators with full privileges and another for operators with more limited privileges.  Finally, the display command is granted a UACC of READ so that any user may issue it.

Create SQDATA0 groups of administrator and operator roles.

ADDGROUP SQDOPER SUPGROUP(<superior group name>)

ADDGROUP SQDADMIN SUPGROUP(<superior group name>)

 

CONNECT (USER1 +

        USER2) +

  GROUP(SQDADMIN) AUTH(CREATE)

 

CONNECT (USER3 +

        USER4 +

        USER5) +

  GROUP(SQDOPER) AUTH(USE)

 

Note, the Groups defined above are only suggestions. While Administrator and Operator roles may be adequate, others can be defined as needed.

5.  Define Resources for SQDconf

Publisher cab (both types) --type=db2 and --type=zlog

CONF.PUBLISHER.ADD

CONF.PUBLISHER.APPLY

CONF.PUBLISHER.CONNECT

CONF.PUBLISHER.CREATE

CONF.PUBLISHER.DISCONNECT

CONF.PUBLISHER.DISPLAY

CONF.PUBLISHER.MIGRATE

CONF.PUBLISHER.MODIFY

CONF.PUBLISHER.MOUNT

CONF.PUBLISHER.PAUSE

CONF.PUBLISHER.REFRESH

CONF.PUBLISHER.REMOVE

CONF.PUBLISHER.RESUME

CONF.PUBLISHER.RESUMEAT

CONF.PUBLISHER.START

CONF.PUBLISHER.STOP

CONF.PUBLISHER.UNMOUNT

 

Store cab --type=store

CONF.STORE.ADD

CONF.STORE.CREATE

CONF.STORE.DISPLAY

CONF.STORE.MODIFY

 

IMS cab --type=ims

CONF.IMS.ADD

CONF.IMS.CREATE

CONF.IMS.DISPLAY

CONF.IMS.MODIFY

CONF.IMS.PAUSE

CONF.IMS.REMOVE

CONF.IMS.RESUME

CONF.IMS.STOP

CONF.IMS.TUNE

 

 

Notes:

The first four steps need only be performed once. If the SQDATA0 class and required user Groups have already been configured for another utility, then only the Resources remain to be defined.

It is only necessary to define those resources applicable to Captures/Publishers used:

Capture

Resources

Db2 Log Reader

CONF.PUBLISHER, CONF.STORE

IMS TM Exit

CONF.PUBLISHER

IMS Log Reader

CONF.IMS, CONF.PUBLISHER

VSAM Log

CONF.PUBLISHER

Keyed Files

CONF.PUBLISHER

 

Example

Define desired profiles in the SQDATA0 class including Generic profiles as desired for the SQDconf Utility. Create two groups; one for SQData product administrators with full privileges, and another for operators with more limited privileges. Finally, the display command is granted a UACC of READ so that any user may issue it.  The six z/OS JOBS below will accomplish the task.

//SQDATA1  JOB 1,MSGCLASS=H,MSGLEVEL=(1,1),NOTIFY=&SYSUID.,

//  TYPRUN=HOLD

//*

//* Define SQDATA0 class in the dynamic CDT

//*

//CLASS    EXEC PGM=IKJEFT1B

//SYSTSPRT DD SYSOUT=*

//SYSTSIN  DD *

RDEFINE CDT SQDATA0 UACC(NONE) +

 CDTINFO(DEFAULTUACC(NONE) CASE(UPPER) FIRST(ALPHA,SPECIAL) +

         OTHER(ALPHA,NATIONAL,NUMERIC,SPECIAL) +

         MAXLENGTH(246) MAXLENX(246) +

         GENERIC(ALLOWED) RACLIST(ALLOWED) +

         POSIT(<posit_number>)) +

 DATA('SQDATA RESOURCE PROFILE CLASS')

/*

 

 

//SQDATAR2 JOB 1,MSGCLASS=H,MSGLEVEL=(1,1),NOTIFY=&SYSUID.,

//  TYPRUN=HOLD

//*

//* Refresh the CDT class

//*

//CDTREFR  EXEC PGM=IKJEFT1B

//SYSTSPRT DD SYSOUT=*

//SYSTSIN  DD *

SETROPTS RACLIST(CDT) REFRESH

/*

 

 

//SQDATAR3 JOB 1,MSGCLASS=H,MSGLEVEL=(1,1),NOTIFY=&SYSUID.,

//  TYPRUN=HOLD

//*

//* Activate the new SQDATA0 class

//*

//CLASSACT EXEC PGM=IKJEFT1B

//SYSTSPRT DD SYSOUT=*

//SYSTSIN  DD *

SETROPTS CLASSACT(SQDATA0) RACLIST(SQDATA0)

SETROPTS GENERIC(SQDATA0)

/*

 

 

//SQDATAR4 JOB 1,MSGCLASS=H,MSGLEVEL=(1,1),NOTIFY=&SYSUID.,

//  TYPRUN=HOLD

//*

//* Create SQDATA0 groups for administrator and operator roles

//*

//GROUP    EXEC PGM=IKJEFT1B

//SYSTSPRT DD SYSOUT=*

//SYSTSIN  DD *

ADDGROUP SQDOPER SUPGROUP(<superior group name>)

ADDGROUP SQDADMIN SUPGROUP(<superior group name>)

CONNECT (USER1 +

        USER2) +

  GROUP(SQDADMIN) AUTH(CREATE)

CONNECT (USER3 +

        USER4 +

        USER5) +

  GROUP(SQDOPER) AUTH(USE)

/*

 

 

//SQDATAR5 JOB 1,MSGCLASS=H,MSGLEVEL=(1,1),NOTIFY=&SYSUID.,

//  TYPRUN=HOLD

//*

//* Define profiles in the SQDATA0 class and PERMIT access.

//*

//GROUP    EXEC PGM=IKJEFT1B

//SYSTSPRT DD SYSOUT=*

//SYSTSIN  DD *

RDEFINE SQDATA0  CONF.**                      UACC(NONE)

 

RDEFINE SQDATA0  CONF.PUBLISHER.DISPLAY.**    UACC(READ)

RDEFINE SQDATA0  CONF.PUBLISHER.MOUNT.**      UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.START.**      UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.PAUSE.**      UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.RESUME.**     UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.STOP.**       UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.UNMOUNT.**    UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.APPLY.**      UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.CONNECT.**    UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.DISCONNECT.** UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.REFRESH.**    UACC(NONE)

 

RDEFINE SQDATA0  CONF.STORE.DISPLAY.**        UACC(READ)

 

RDEFINE SQDATA0  CONF.IMS.DISPLAY.**          UACC(READ)

RDEFINE SQDATA0  CONF.IMS.STOP.**             UACC(NONE)

RDEFINE SQDATA0  CONF.IMS.PAUSE.**            UACC(NONE)

RDEFINE SQDATA0  CONF.IMS.RESUME.**           UACC(NONE)

RDEFINE SQDATA0  CONF.IMS.TUNE.**             UACC(NONE)

 

PERMIT CONF.**                    CLASS(SQDATA0) ID(SQDADMIN) ACC(READ)

PERMIT CONF.PUBLISHER.MOUNT.**     CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

PERMIT CONF.PUBLISHER.START.**     CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

PERMIT CONF.PUBLISHER.PAUSE.**     CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

PERMIT CONF.PUBLISHER.RESUME.**    CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

PERMIT CONF.PUBLISHER.STOP.**      CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

PERMIT CONF.PUBLISHER.UNMOUNT.**   CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

PERMIT CONF.PUBLISHER.APPLY.**     CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

PERMIT CONF.PUBLISHER.CONNECT.**   CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

PERMIT CONF.PUBLISHER.DISCONNECT.** CLASS(SQDATA0) ID(SQDOPER) +

      ACC(READ)

PERMIT CONF.PUBLISHER.REFRESH.**   CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

 

PERMIT CONF.IMS.TUNE.**            CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

PERMIT CONF.IMS.STOP.**            CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

PERMIT CONF.IMS.PAUSE.**           CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

PERMIT CONF.IMS.RESUME.**          CLASS(SQDATA0) ID(SQDOPER) ACC(READ)

/*

 

 

//SQDATAR6 JOB 1,MSGCLASS=H,MSGLEVEL=(1,1),NOTIFY=&SYSUID.,

//  TYPRUN=HOLD

//*

//* Refresh the SQDATA0 classto activate the profiles and permissions

//*

//REFRESH  EXEC PGM=IKJEFT1B

//SYSTSPRT DD SYSOUT=*

//SYSTSIN  DD *

SETROPTS RACLIST(SQDATA0) REFRESH

/*

//

 

Note, In the example, the following possible profiles were not defined because they are all administrator capabilities covered by the CONF.** generic, to which only users in the SQDADMIN group are granted READ access.

RDEFINE SQDATA0  CONF.PUBLISHER.ADD.**        UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.CREATE.**     UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.MODIFY.**     UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.REMOVE.**     UACC(NONE)

RDEFINE SQDATA0  CONF.PUBLISHER.MIGRATE.**    UACC(NONE)

 

RDEFINE SQDATA0  CONF.STORE.ADD.**            UACC(NONE)

RDEFINE SQDATA0  CONF.STORE.CREATE.**         UACC(NONE)

RDEFINE SQDATA0  CONF.STORE.MODIFY.**         UACC(NONE)

 

RDEFINE SQDATA0  CONF.IMS.ADD.**              UACC(NONE)

RDEFINE SQDATA0  CONF.IMS.CREATE.**           UACC(NONE)

RDEFINE SQDATA0  CONF.IMS.MODIFY.**           UACC(NONE)

RDEFINE SQDATA0  CONF.IMS.REMOVE.**           UACC(NONE)