IBM File Manager v14.1 security configuration for ACF2
book
Article ID: 203412
calendar_today
Updated On:
Products
ACF2ACF2 - z/OSACF2 - MISC
Issue/Introduction
This document outlines resource names and considerations when configuring security for IBM File Manager v14.1 on a system secured by ACF2.
Resolution
SAF controls access to File Manager functions as follows:
If access to the profile FACILITY(FILEM.FUNCTION.fc) in the FACILITY class is defined (where fc is the function code as shown in IBMTable 3. File Manager function to profile name cross-reference), this controls access to the function.
With ACF2 all resources are defined by default, so Resource Class FACILTIY rules would be created for FILEM.FUNCTION.fc where fc is the function code in IBM Table 3. File Manager function to profile name cross-reference. Based on this table the resources would be:
Example 1: With ACF2, for example to give a user access to the TP function give the user ALTER, UPDATE, or READ access to FACILITY(FILEM.FUNCTION.TP), and to give a user access to the DB function give the user ALTER, UPDATE, or READ access to FACILITY(FILEM.FUNCTION.DB):
ACF SET RESOURCE(FAC) RECKEY FILEM ADD( FUNCTION.TP UID(UID string for user) SERVICE(UPDATE, ADD, READ) ALLOW) RECKEY FILEM ADD( FUNCTION.DB UID(UID string for user) SERVICE(UPDATE, ADD, READ) ALLOW) F ACF2,REBUILD(FAC)
** Note the SERVICE can be UPDATE, ADD and READ or a specific SERVICE as required.
In RACF, if access to the profile FACILITY(FILEM.FUNCTION.fc) in the FACILITY class is not defined, the profile name shown in IBM Table 3. File Manager function to profile name cross-reference in the form FILEM.group.name is used.
With ACF2, if a site wants to code Resource Class FACILTIY rules for resources in the form of FILEM.group.name rather than FILEM.FUNCTION.fc, then an ACF2 GSO SAFDEF for resource FILEM.FUNCTION.fc will need to be coded with MODE=IGNORE and RC=4. See Example 2 for a sample SAFDEF.
Based on the File Manager functions the resources would be:
FILEM.DISK.INPUT Disk input functions FILEM.DISK.UPDATE Disk update functions FILEM.TAPE.INPUT Tape input functions FILEM.TAPE.OUTPUT Tape output functions FILEM.TAPE.DUPLICATE Tape copy functions FILEM.TAPE.UPDATE Tape update functions FILEM.VSAM.UPDATE VSAM update functions FILEM.OAM.OUTPUT OAM output functions FILEM.OAM.UPDATE OAM update functions FILEM.LOADMOD.UPDATE Load module update functions FILEM.OTHER.ALL All other functions FILEM.TAPE.BLP See Controlling Bypass Label Processing (BLP) FILEM.DISK.FULLPACK Controlling fullpack access to DASD volumes
Example 2: With ACF2, for example create an ACF2 GSO SAFDEF to ignore the resource check for all File Manager functions FILEM.FUNCTION.fc. Then code rules for each function, for example to give a user access to any tape input function or DISK function, give the user ALTER, UPDATE, or READ access to FACILITY(FILEM.TAPE.INPUT)
ACF SET C(GSO) INSERT SAFDEF.filemt ID(filemt) FUNCRET(4) RETCODE(4) MODE(IGNORE) - RACROUTE(REQUEST=AUTH,CLASS=FACILITY,ENTITYX=FILEM.FUNCTION.-) F ACF2,REFRESH(SAFDEF)
ACF SET RESOURCE(FAC) RECKEY FILEM ADD( TAPE.INPUT UID(UID string for user) SERVICE(UPDATE, ADD, READ) ALLOW) RECKEY FILEM ADD( TAPE.DISK UID(UID string for user) SERVICE(UPDATE, ADD, READ) ALLOW) F ACF2,REBUILD(FAC)
Note: the SERVICE can be UPDATE, ADD and READ or a specific SERVICE as required.
If using resource naming convention FILEM.group.name described above, all protected functions not listed in IBM Table 3. File Manager function to profile name cross-reference are protected by the FILEM.OTHER.ALL profile. The File Manager functions protected by FILEM.OTHER.ALL are listed in IBM Table 2. File Manager functions protected by FILEM.OTHER.ALL.
Example 3: With ACF2 to give a user access to the Resource Class FACILTIY resource FILEM.OTHER.ALL give the user ALTER, UPDATE, or READ access to FACILITY(FILEM.OTHER.ALL). ALTER, UPDATE or READ access means that the user can use the function.
ACF SET RESOURCE(FAC) RECKEY FILEM ADD( OTHER.ALL UID(UID string for user) SERVICE(UPDATE, ADD, READ) ALLOW) F ACF2,REBUILD(FAC)
Note: the SERVICE can be UPDATE, ADD and READ or a specific SERVICE as required.
IBM File Manager issues REQUEST=AUTH,CLASS=FACILITY,STATUS=ACCESS calls which can cause S047 abends with ACF2.
The RACROUTE STATUS=ACCESS call permits a user to interrogate security definitions (access and resource rules) to determine access levels for a user. No auditing is done for this request.
In order to maintain system integrity, ACF2 requires that a user be APF authorized to access security definitions. Because the IBM File Manager program FMNMAIN and FMNMIMS are not APF authorized, ACF2 will abend the task with an S047 abend.
To accommodate this situation, ACF2 will allow the security administrator to define the specific calls for which the APF authorization check for STATUS=ACCESS will be bypassed.
Broadcom's policy is that allowing non-APF authorized users this knowledge is a security exposure. Sites that do not want to allow this call should contact the vendor of the product and request that the STATUS=ACCESS calls be made in an APF authorized environment.
The bypassing of the authorization check in ACF2 is done through use of the 'NOAPFCHK' keyword added to the GSO SAFDEF record. 'NOAPFCHK' will only be honored for STATUS=ACCESS calls. An example of the SAFDEF used for the IBM File Manager product follows: