On Wednesday, 03/09/2011 at 11:29 EST, "Vogtmann, Wallace B" 
<wvogt...@tcfbank.com> wrote:
> We're new to zVM. Have the system operational with standard IBM supplied
> User/Guest definitions. For example, we've implemented RACF, DIRMAINT,
> & PERF TK (soon Omegamon XE).
> 
> Our security folks don't really like us logging in as MAINT, TCPMAINT,
> RACMAINT, etc. to do our changes - can't really tell who is doing what.
> Plus it's hard to have good/secure passwords when need to have multiple
> real users login to multiple guests, etc.
> 
> Is there any examples of what would be good definitions for (1) standard
> system programmer guest accounts and (2) standard service machines? What
> RIGHTS and ACCESS definitions should be standard. We only plan on 
running
> Linux guests and standard IBM/3rd party tools, so just need a few
> Users/Guests
> that have the appropriate access for SysProg support, etc.
> 
> Basically, we have the system in and operational, but NOW how should we
> REALLY
> have it setup to run/manage it securely and effectively. Any RedBooks?
> I've looked, but don't see any that fit the bill.

Wally, look at the z/VM 6.1 RACF Security Administrator's Guide (even if 
you're running 5.4) and read "Defining Shared IDs" in Chapter 4.  That 
book is your new best friend.   As the book recommends, remove the shared 
ID's password (ALTUSER ... NOPASSWORD NOPHRASE).  That ensures that the 
user can't be revoked due to invalid password attempts (like when you 
forget to use the BY operand!).

Those without an ESM should set the directory password of those shared IDs 
to "LBYONLY" and use the LOGONBY directory statement to authorize shared 
access.

Alan Altmark

z/VM and Linux on System z Consultant
IBM System Lab Services and Training 
ibm.com/systems/services/labservices 
office: 607.429.3323
mobile; 607.321.7556
alan_altm...@us.ibm.com
IBM Endicott

Reply via email to