Securing Keyrings
search cancel

Securing Keyrings

book

Article ID: 12015

calendar_today

Updated On:

Products

Top Secret Top Secret - LDAP

Issue/Introduction



Can keyrings be secured by CA Top Secret?

 

Environment

Release: TOPSEC00200-15-Top Secret-Security
Component:

Resolution

To use the ring-specific checking, the RDATALIB resource class is used.

With ring-specific profile checking, a resource with the format

RDATALIB(<ringOwner>.<ringName>.LST)

is used to provide access control to a specific key ring on R_datalib READ functions, that are, DataGetFirst, DataGetNext, and GetUpdateCode. A resource with the format <ringOwner>.<ringName>.UPD is used to provide access control to a specific key ring on the UPDATE functions, that are, NewRing, DataPut, DataRemove, and DelRing.

Example PERMIT to authorize acid JOE to use JOE's Keyring called FTPRING.

TSS PERMIT(JOE) RDATALIB(JOE.FTPRING.LST) ACC(READ)