search cancel

Symlink creation makeFSP 8 4 8 failure when using extended ACLs

book

Article ID: 190444

calendar_today

Updated On:

Products

Top Secret Top Secret - LDAP WEB ADMINISTRATOR FOR TOP SECRET

Issue/Introduction

CICS creating symlinks receives the following violation: 

1CA Mainframe Security     - OE REPORT                           - PAGE    1
 DATE 05/06/20 (20.127) TIME  9.17

       SERVICE      USERID    GROUP        UID         GID    SAF     RC    RSN
         DATE          TIME    JOBNAME   SOURCE   SYSID   CPU   SECLABEL

   makeFSP          USERA    G0032107           0       32107   8      4      8
   05/06/20  20.127    6.15.40 USERA                     SY52
   No extended reason available for indicated return and reason
    Function: symlink              User Type: Local
    Filename: symlink.file
    File Permissions: Owner: rwx Group: rwx Other: rwx
    Owning UID:            0   Owning GID:       51622
    Volume  : VOL069  File Identifier:   C4E2E8F0F6F9BE2500000000055B0A86
    File Audit Options:
    User    : Read Failure  Write Failure  Exec/Search Failure
    Auditor : Read None     Write None     Exec/Search None
****************************************************** Bottom of Data *********

Giving the user ownership to the directory causes the violation to go away.

Environment

Release : 16.0

Component : CA Top Secret for z/OS

Resolution

SO13110