At my former customer, we created several RACF groups.  To name a few:
  LBSYST to control LOGONBY to various users by system programmers
  LBOPER for the operators' group
  SYSALL to permit the system programmers to link to most MDISKs
When there is a new system programmer:
  RAC CONNECT theNewGuy GROUP(SYSALL) SPECIAL
  RAC CONNECT theNewGuy GROUP(LBSYST) SPECIAL
For a new server:
  RAC RDEFINE SURROGAT LOGONBY.server
  RAC PERMIT LOGONBY.server  CLASS(SURROGAT)  ID(LBSYST) ACCESS(ALTER)
For a new system SW minidisk:
  RAC RDEFINE VMMDISK xxxxxx.vvvv
  RAC PERMIT xxxxx.vvvv CLAS(VMMDISK) ID(SYSALL) ACCESS(ALTER)

In general: work with groups, and give permissions to groups, not to
individual people.

2011/3/9 Richard Troth <vmcow...@gmail.com>

> You've gotten several excellent responses along the common theme: "logon
> by".
>
> I like to translate VM concepts into Unix/Linux/POSIX concepts for the
> sake of your peers.  Think "sudo".  If your auditors fear that word
> (they should not), then remind them that you have RACF in place, so
> z/VM will only do this under control of the security tool.  (It *can*
> do logon by w/o RACF, but config is different.)
>
> In Unix/Linux land, many admins increasingly require: sign on with
> your own credentials, then 'sudo' as needed.  It's good hygiene.  You
> get a better audit trail and yet can still do all the work you need
> to.  The difference on z/VM is that you're using virtual machines
> instead of just processes, so you have to do it from the logon screen
> ...
>
>        logon maint by wvogtman
>
> Ahhh...  Enjoy!
>
> -- R;   <><
> Rick Troth
> Velocity Software
> http://www.velocitysoftware.com/
>
>
>
>
>
>
>
>
> On Wed, Mar 9, 2011 at 11:28, Vogtmann, Wallace B <wvogt...@tcfbank.com>
> wrote:
> > We're new to zVM. Have the system operational with standard IBM supplied
> > User/Guest definitions. For example, we've implemented RACF, DIRMAINT,
> > & PERF TK (soon Omegamon XE).
> >
> > Our security folks don't really like us logging in as MAINT, TCPMAINT,
> > RACMAINT, etc. to do our changes - can't really tell who is doing what.
> > Plus it's hard to have good/secure passwords when need to have multiple
> > real users login to multiple guests, etc.
> >
> > Is there any examples of what would be good definitions for (1) standard
> > system programmer guest accounts and (2) standard service machines? What
> > RIGHTS and ACCESS definitions should be standard. We only plan on running
> > Linux guests and standard IBM/3rd party tools, so just need a few
> > Users/Guests
> > that have the appropriate access for SysProg support, etc.
> >
> > Basically, we have the system in and operational, but NOW how should we
> > REALLY
> > have it setup to run/manage it securely and effectively. Any RedBooks?
> > I've looked, but don't see any that fit the bill.
> >
> > Thx
> > - Wally Vogtmann
> > - Technical Services
> > - wvogt...@tcfbank.com
> > ----------------------------Disclaimer----------------------------
> > This email may contain privileged and/or confidential information that
> > is intended solely for the use of the addressee.  If you are not the
> > intended recipient, you are strictly prohibited from disclosing, copying,
> > distributing or using any of the information contained in the
> transmission.
> > If you received this communication in error, please contact the sender
> > (“Company”) immediately and destroy the material in its entirety,
> > including all electronic and hard copies.
> >
> > This communication may contain nonpublic personal information about
> > consumers which is subject to restrictions under the Gramm-Leach-Bliley
> > Act and the Sarbanes-Oxley Act.  You may not directly or indirectly reuse
> > or disclose such nonpublic personal information for any purpose other
> than
> > to provide the services for which you are receiving the information.
> >
> > There are risks associated with the use of electronic transmission.  The
> > sender of this information does not control the method of transmittal or
> > any service providers and the sender assumes no duty, liability, or
> > obligation for the security, receipt, or any third party interception of
> > this transmission.
> >
> > The Company reserves the right to amend statements made herein in the
> event
> > of a mistake. Unless expressly stated herein to the contrary, only
> agreements
> > in writing signed by an authorized officer of the Company may be enforced
> > against it.
> >
>



-- 
Kris Buelens,
IBM Belgium, VM customer support

Reply via email to