There is also IBM page
http://www.ibm.com/support/docview.wss?rs=171&uid=swg21205523
which gives examples of digital certificate commands in various dialects.

Bill

On Tue, 8 Jul 2008 11:55:52 -0500, Big Iron <[EMAIL PROTECTED]> wrote:

>There is a cookbook for Top Secret running in a z/OS environment at
>http://supportconnectw.ca.com/public/ca-topsecret/manuals/TSSCookB.pdf
>which might be helpful to you or your Top Secret person.
>
>Bill
>
>On Mon, 7 Jul 2008 10:47:19 -0500, Tony B. <[EMAIL PROTECTED]> wrote:
>
>>For the examples below:
>>
>>TSS ADD( any-dept-acid ) IBMFAC(IRRDPIOO)
>>TSS PERMIT(jeg) IBMFAC(IRRDPIOO) ACCESS(READ)
>>
>>If further information is needed regarding this "translation" is needed, let
>>me know.
>>There is a Top Secret related list server in YAHOO.
>>
>>
>>
>>
>>
>>"John Eells" <[EMAIL PROTECTED]> wrote in message news:
>><[EMAIL PROTECTED]>...
>>> Jim wrote:
>>> > I just started working for a new company where I am installing z/OS
>>> > 1.9. I have virtually no security other than what I need to get by.
>>> > The 3rd job in the 1.9 installation is job RACFDRV which is a bunch of
>>> > updates to the security system. We have Top Secret administered by
>>> > another person who is slow to non-responsive for requests. I gave him
>>> > the RACF job to convert to Top Secret. He informed me that he does not
>>> > know what to do.
>>> >
>>> > I have included the job. Can anyone help me get the Top Secret
>>> > equivelences for these statements? Thanks.   Jim
>>> <chop>
>>>
>>>
>>> Long ago and far away, we attempted to document all the security updates
>>> needed to make installation succeed with ServerPac.  They were scattered
>>> about the documentation and hard to test.  As a result, testing failed a
>>> lot and our customers had no consolidated view of what profiles they
>>> needed to have.  So we put them all into new jobs called RACFDRV and
>>> RACFTGT that get tested.
>>>
>>> While you can certainly run RACFDRV as-is (in a RACF environment, at
>>> least), it's not actually intended to be run except after suitable
>>> modification to meet your installation's security standards, and then
>>> only against a new, empty RACF database.
>>>
>>> Mostly, the same goes for RACFTGT.
>>>
>>> What these jobs are really for is to provide a (tested!) list of
>>> security definitions that will get you through initial installation and
>>> IVPs.  Your security administrator should be able to figure out what
>>> should really be done to provide any missing definitions you need in
>>> your environment, according to your standards.  Once that's all done,
>>> you might still need more definitions to enable more functions to work.
>>>
>>> As I understand it, this is even more true in an ACF2 or TopSecret
>>> environment than it is in a RACF environment because they have
>>> fundamentally different approaches to security definitions.
>>>
>>> To take the first pair as an example:
>>>
>>> RDEFINE +
>>>    FACILITY IRRDPI00 +
>>>    UACC(NONE)
>>> PE +
>>>    IRRDPI00 +
>>>    CLASS(FACILITY) +
>>>    ID(JEG) +
>>>    ACC(READ)
>>>
>>> What this means is that the user "JEG" needs to have READ (or higher)
>>> access to the "IRRDPI00" profile in the FACILITY class.  However you
>>> accomplish that with ACF2 or TopSecret I have no clue, but someone should.
>>>
>>> (Note: This is actually a bad example.  In this particular case, since I
>>> believe IRRDPI00 is specific to a RACF environment you can probably
>>> ignore it in an ACF2 or TopSecret environment.)
>>>
>>> --
>>> John Eells
>>> z/OS Technical Marketing
>>> IBM Poughkeepsie
>>> [EMAIL PROTECTED]
>>>
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to