Re: RACF, setropts inactive() and long running guests

2008-09-29 Thread Colin Allinson
The way we handle this goes back a long way before the latest facilities 
to set NOPASSWORD were available.

What we do is connect all users who are likely to be affected by this 
(long running servers etc.) to a specific RACF group.

We then run a daily procedure in VMUTIL, that is authorised to list that 
group and issue an ALTUSER RESUME for each user in it. That is all that is 
needed. The user does not have to be revoked at the time and knowledge of 
the password is not needed.

As we always use LOGONBY for any non-personal userid's, we should probably 
update our process to use NOPASSWORD, but this method may be useful for 
userids where you may, occasionally, need to know the password.



Colin Allinson

Amadeus Data Processing GmbH



Re: RACF, setropts inactive() and long running guests

2008-09-28 Thread Leland Lucius

Alan Altmark wrote:
On Sunday, 09/28/2008 at 12:50 EDT, Leland Lucius [EMAIL PROTECTED] 
wrote:

This would certainly make it easy and we wouldn't have to have any
non-standard scheduled touching of the ID.  I'll have to ponder it a
little though since we do log onto a guest every so often to get to its
console.  But, that's so seldom, a call to the security group could
temporarily add a password.


You don't need to logon to get the console.  From a class C user:
CP SEND CP linuxuser CLOSE CONS TO whomever

But, if the server can't be accessed via the network, we may need to 
access the console to play around...like maybe in single user mode. 
Mind you, we hardly ever have to do it, but...


I've been playing around with your method (LOGONBY and NOPASS) and it 
looks like its going to work beautifully.  And the best part is that it 
can all be controlled via DIRMAINT...no security group involvement. 
(They let us do DIRMAINT, but not RACF.  :-))


Thanks,

Leland


Re: RACF, setropts inactive() and long running guests

2008-09-27 Thread Kris Buelens
At my -former- customer's installation, we set the inactivity value to
something around 6 months.  This suited us as it was decided to IPL
the z/VM systems at winter/summer time zone change.

If that doesn't suit you:
To take care of MAINT  friends, you might use a server like VMUTIL to
have those XAUTOLOGged every month or so.

For other servers that cannot be XAUTOLOG this way, there may be a way
to fool RACF, I didn't test, but maybe it can work.  My first idea was
to open an FTP session into z/VM, and use the userid  password of the
server whose last logon time you want to update.  Further thought: use
the CSL call to perform password validation.  Obvious
problem/drawback: you need to know the server's password.  Can be
easily tested by observing the last logon date with the RAC LISTUSER
command.

Other thoughts: maybe the RACROUTE macro can be used to update the
last logon date.  Or, also not checked:since z/VM 5.3, you get an LDAP
server with z/VM, when properly set up, LDAP clients can then via LDAP
update RACF user data.  I don't know if last-logon date is one of the
RACF fields exposed to LDAP.  If it is, the CMS LDAP client could be
used to issue a Q NAMES (e.g. weekly) and set the last logon date for
every user that is found to be logged on.  (As I'm currently in the
team writing a redbook about a.o. password synchronisation between
z/VM ad z/OS -what uses LDAP- I may be able next week to find this
out).


2008/9/27 Leland Lucius [EMAIL PROTECTED]

 Just wondering what folks set INACTIVE() to a Linux only environment where 
 guests stay up for long periods or where MAINT and the like aren't used for 
 long periods.

 When we installed RACFVM, our security team set the same options as are being 
 used on z/OS which we all thought was a good idea.  But, we've been getting a 
 lot of guests with revoked IDs.

 It wasn't until today when logging onto MAINT did we realize what we'd done 
 since the logon seemed to hang and we didn't figure out what was going on 
 until we looked at OPERATORs console:

 ICH303I INACTIVE INTERVAL EXCEEDED BY SPECIAL USER MAINT AT TERMINAL AC182D8F.
 13ICH304D REPLY Y TO ACTIVATE USER OR N TO REVOKE USERID MAINT .

 So, we have the notion of simply change our INACTIVE(45) to NOINACTIVE (if we 
 can get security to bite), but were wondering if there were other options.

 Thanks,

 Leland



--
Kris Buelens,
IBM Belgium, VM customer support


Re: RACF, setropts inactive() and long running guests

2008-09-27 Thread Leland Lucius

Kris Buelens wrote:

If that doesn't suit you:
To take care of MAINT  friends, you might use a server like VMUTIL to
have those XAUTOLOGged every month or so.

Now I get what ppl were saying before about XAUTOLOGing things 
regularly.  Didn't sink in before...



For other servers that cannot be XAUTOLOG this way, there may be a way
to fool RACF, I didn't test, but maybe it can work.  My first idea was
to open an FTP session into z/VM, and use the userid  password of the
server whose last logon time you want to update.  Further thought: use
the CSL call to perform password validation.  Obvious
problem/drawback: you need to know the server's password.  Can be
easily tested by observing the last logon date with the RAC LISTUSER
command.

Or precede the FTP/CSL call with a DIRM SETPW, so the password is known 
and, when done, do the DIRM SETPW again to some random value.  That 
would work just dandy for us.


Will give this a try if there's nobody mentions a RACF-way of doing it.

Thanks,

Leland


Re: RACF, setropts inactive() and long running guests

2008-09-27 Thread Kris Buelens
DIRM SETPW: that would need the the Dirmaint-RACF interfaces active.
If you'd go that way, better use RAC ALTUSER userid PASSWORD(xyz)

2008/9/27 Leland Lucius [EMAIL PROTECTED]

 Kris Buelens wrote:

 If that doesn't suit you:
 To take care of MAINT  friends, you might use a server like VMUTIL to
 have those XAUTOLOGged every month or so.

  Now I get what ppl were saying before about XAUTOLOGing things regularly.
  Didn't sink in before...

  For other servers that cannot be XAUTOLOG this way, there may be a way
 to fool RACF, I didn't test, but maybe it can work.  My first idea was
 to open an FTP session into z/VM, and use the userid  password of the
 server whose last logon time you want to update.  Further thought: use
 the CSL call to perform password validation.  Obvious
 problem/drawback: you need to know the server's password.  Can be
 easily tested by observing the last logon date with the RAC LISTUSER
 command.

  Or precede the FTP/CSL call with a DIRM SETPW, so the password is known
 and, when done, do the DIRM SETPW again to some random value.  That would
 work just dandy for us.

 Will give this a try if there's nobody mentions a RACF-way of doing it.

 Thanks,

 Leland




-- 
Kris Buelens,
IBM Belgium, VM customer support


Re: RACF, setropts inactive() and long running guests

2008-09-27 Thread Alan Altmark
On Saturday, 09/27/2008 at 12:26 EDT, Leland Lucius [EMAIL PROTECTED] 
wrote:
 Just wondering what folks set INACTIVE() to a Linux only environment
 where guests stay up for long periods or where MAINT and the like aren't
 used for long periods.
 
 When we installed RACFVM, our security team set the same options as are
 being used on z/OS which we all thought was a good idea.  But, we've
 been getting a lot of guests with revoked IDs.
:
 So, we have the notion of simply change our INACTIVE(45) to NOINACTIVE
 (if we can get security to bite), but were wondering if there were other
 options.

A possible compromise could be:

ALTUSER userid NOPHRASE NOPASSWORD

will completely remove the password and phrase.
- No one can logon directly to or use the id for authentication
- The user can still be XAUTOLOGed
- The user will never be revoked due to inactivity or too many logon 
attempts with a bad password

Alan Altmark
z/VM Development
IBM Endicott


Re: RACF, setropts inactive() and long running guests

2008-09-27 Thread Thomas Kern
Could we still get onto that userid via LOGONBY?

/Tom Kern

Alan Altmark wrote:
 A possible compromise could be:
 
 ALTUSER userid NOPHRASE NOPASSWORD
 
 will completely remove the password and phrase.
 - No one can logon directly to or use the id for authentication
 - The user can still be XAUTOLOGed
 - The user will never be revoked due to inactivity or too many logon 
 attempts with a bad password
 
 Alan Altmark
 z/VM Development
 IBM Endicott
 


Re: RACF, setropts inactive() and long running guests

2008-09-27 Thread Scott Rohling

Yes...

Sent from my iPhone

On Sep 27, 2008, at 5:48 PM, Thomas Kern [EMAIL PROTECTED] wrote:


Could we still get onto that userid via LOGONBY?

/Tom Kern

Alan Altmark wrote:

A possible compromise could be:

ALTUSER userid NOPHRASE NOPASSWORD

will completely remove the password and phrase.
- No one can logon directly to or use the id for authentication
- The user can still be XAUTOLOGed
- The user will never be revoked due to inactivity or too many logon
attempts with a bad password

Alan Altmark
z/VM Development
IBM Endicott



Re: RACF, setropts inactive() and long running guests

2008-09-27 Thread Leland Lucius

Alan Altmark wrote:


A possible compromise could be:

ALTUSER userid NOPHRASE NOPASSWORD

will completely remove the password and phrase.
- No one can logon directly to or use the id for authentication
- The user can still be XAUTOLOGed
- The user will never be revoked due to inactivity or too many logon 
attempts with a bad password


This would certainly make it easy and we wouldn't have to have any 
non-standard scheduled touching of the ID.  I'll have to ponder it a 
little though since we do log onto a guest every so often to get to its 
console.  But, that's so seldom, a call to the security group could 
temporarily add a password.


Thanks much,

Llenad


Re: RACF, setropts inactive() and long running guests

2008-09-27 Thread Leland Lucius

Scott Rohling wrote:

Yes...

Sent from my iPhone

On Sep 27, 2008, at 5:48 PM, Thomas Kern [EMAIL PROTECTED] wrote:


Could we still get onto that userid via LOGONBY?


Awesome, then that sounds like the way to go.

Thanks everyone!

Leland


Re: RACF, setropts inactive() and long running guests

2008-09-27 Thread Alan Altmark
On Sunday, 09/28/2008 at 12:50 EDT, Leland Lucius [EMAIL PROTECTED] 
wrote:
 This would certainly make it easy and we wouldn't have to have any
 non-standard scheduled touching of the ID.  I'll have to ponder it a
 little though since we do log onto a guest every so often to get to its
 console.  But, that's so seldom, a call to the security group could
 temporarily add a password.

You don't need to logon to get the console.  From a class C user:
CP SEND CP linuxuser CLOSE CONS TO whomever

Of course, products like IBM Operations Manager for z/VM can obviate the 
need to manage console logs in this way.

Alan Altmark
z/VM Development
IBM Endicott


RACF, setropts inactive() and long running guests

2008-09-26 Thread Leland Lucius
Just wondering what folks set INACTIVE() to a Linux only environment 
where guests stay up for long periods or where MAINT and the like aren't 
used for long periods.


When we installed RACFVM, our security team set the same options as are 
being used on z/OS which we all thought was a good idea.  But, we've 
been getting a lot of guests with revoked IDs.


It wasn't until today when logging onto MAINT did we realize what we'd 
done since the logon seemed to hang and we didn't figure out what was 
going on until we looked at OPERATORs console:


ICH303I INACTIVE INTERVAL EXCEEDED BY SPECIAL USER MAINT AT TERMINAL 
AC182D8F.

13ICH304D REPLY Y TO ACTIVATE USER OR N TO REVOKE USERID MAINT .

So, we have the notion of simply change our INACTIVE(45) to NOINACTIVE 
(if we can get security to bite), but were wondering if there were other 
options.


Thanks,

Leland