Security Features
This chapter describes TACF and programming features associated with security.
1. Overview
An OSC application server could encounter any of the following security threats when there are a large number of users.
-
Unauthorized server access
-
Unauthorized file or directory access
-
Unauthorized data modification
-
Unauthorized data deletion or destruction
To avoid these problems, administrators can block access to system resources from unauthorized users and thus protect the resources. Using OpenFrame/Tmax Access Control Facility (hereafter TACF), the OSC system provides the following security features for transactions and resources.
2. TACF
The OSC application server security features are based on TACF functions. The OSC application server security features are based on TACF functions.
TACF protects the system from unauthorized users by requiring an authentication and authorization checks from users and then blocking access to system components by unauthorized users. TACF provides basic access control and authorization, and the TACF resource module of OSC application server enables security policies. This way, TACF provides security for an OpenFrame system as Resource Access Control Facility (RACF) does for an IBM mainframe.
Security check features can be configured differently for each OSC application server, in the SAF section of the osc.{servername} subject under OpenFrame Configuration.
|
3. User Authentication Process
The OSC system needs to know the identity of any user who requests access to a resource to verify that the user has sufficient privileges to access the requested resource. This authentication is achieved through the user SIGNON process. To sign on to the OSC system, users must enter the SIGNON transaction id, CESN, or call SIGNON directly from an application server. This associates the user ID with the terminal used for the SIGNON transaction.
The SIGNOFF process notifies the system that the user has finished using the system. To sign off, users must enter the SIGNOFF transaction ID, OESF, or call the SIGNOFF command from an application program.
For more information about CESN/CESF transactions, refer to OpenFrame OSC Administrator’s Guide. |
User Authentication Process Commands
The following is a list of user authentication process commands. For more information about each command, refer to the respective section.
Command | Description |
---|---|
Removes the authentication granted to a specific user ID. |
|
Authenticates a user ID. |
3.1. SIGNOFF
This command signs a user out from a terminal. After SIGNOFF has been completed, the OSC system provides security services to the default user ID specified to the VALUE of the DFLTUSER key in the SAF section, from the osc.{servername} subject under OpenFrame Configuration. There are on options for this command.
-
Syntax
EXEC CICS SIGNOFF END-EXEC.
For more information about the osc.{servername} subject, refer to OpenFrame Configuration Guide. |
3.2. SIGNON
Authenticates a user ID and signs the user on to a terminal.
-
Syntax
EXEC CICS SIGNON [option …] END-EXEC.
-
Options
Option Description GROUPID
Specifies the TACF group in which the user will be placed.
NEWPASSWORD
Specifies a new password.
PASSWORD
Specifies the user’s current password.
USERID
Specifies the user ID.
|
4. User Password Process
In the OSC system, passwords can be modified or verified by a process that is separate from user authentication.
User Password Process Commands
The following is a list of user password process commands. For more information about each command, refer to the respective section.
Command | Description |
---|---|
Changes a user’s password. |
|
Compares the specified password with the user’s password. |
4.1. CHANGE PASSWORD
Changes a user’s password. The current password must be provided by the user to change it. To avoid divulging any password information, the values in the PASSWORD and NEWPASSWORD options must be deleted after using CHANGE PASSWORD.
-
Syntax
EXEC CICS CHANGE PASSWORD [option …] END-EXEC.
-
Options
Option Description NEWPASSWORD
Specifies the new password.
PASSWORD
Specifies the current password.
USERID
Specifies the user ID associated with the password to be changed.
Only parsing is supported for ESMREASON and ESMRESP.
4.2. VERIFY PASSWORD
Checks a specified password against the password stored for a user. If the passwords match, security information for the user can be accessed. To avoid divulging any password information, the value in the PASSWORD option must be deleted after using VERIFY PASSWORD.
-
Syntax
EXEC CICS VERIFY PASSWORD [option …] END-EXEC.
-
Options
Option Description CHANGETIME
Returns the last time that the password was changed, in ABSTIME format.
DAYSLEFT
Returns the amount of time remaining before the password expires.
EXPIRYTIME
Returns the password expiration date in ABSTIME format.
INVALIDCOUNT
Returns the number of times that the password was incorrectly entered.
LASTUSETIME
Returns the last access time by the specified user, in ABSTIME format.
PASSWORD
Specifies the password to verify.
USERID
Specifies the user ID associated with the password to be verified.
Only parsing is supported for ESMREASON and ESMRESP.
5. User Authorization Process
When a user is authenticated by the OSC system, he or she has been identified by the system. In order to access resources on the system, however, the user must be registered in TACF with the proper authorization. Verification of a user’s authorization is done by the user authorization process.
User Authorization Process Command
The following is the user authentication processing command. For more information about the command, refer to the respective section.
Command | Description |
---|---|
Checks a signed-on user’s authorization to access a specific resource. |
5.1. QUERY SECURITY
Checks a signed-on user’s authorization to access a specific resource. It can be used for user-defined resource classes as well as the default resource classes provided by TACF.
-
Syntax
EXEC CICS QUERY SECURITY [option …] END-EXEC.
-
Options
Option Description RESTYPE
Specifies the type of resource to be checked. Only TRANSATTACH is supported. To use RESTYPE, set the VALUE of the SEC key to YES, in the SAF section from the osc.{servername} subject under OpenFrame Configuration.
RESCLASS
Specifies the class of resource to be checked.
RESIDLENGTH
Specifies the length of resource name in RESID. This option must be used when RESCLASS is specified.
RESID
Specifies the name of the resource to be checked.
READ
Returns a CVDA value that indicates whether or not the user has READ authorization for the resource.
UPDATE
Returns a CVDA value that indicates whether or not the user has UPDATE authorization for the resource.
CONTROL
Returns a CVDA value that indicates whether or not the user has CONTROL authorization for the resource.
ALTER
Returns a CVDA value that indicates whether or not the user has ALTER authorization for the resource.
LOGMESSAGE
Option to prohibit security violation messages. Either LOG or NOLOG can be specified as the CVDA value.
NOLOG
Prohibits security violation messages. It can be used instead of the LOGMESSAGE (NOLOG) option.
LOG
Sends security violation messages to the user. It can be used instead of the LOGMESSAGE (LOG) option.
For more information about how to configure the osc.{servername} subject, refer to OpenFrame Configuration Guide. |