How to interpret the RACF commands to set up Liberty Server for z/OS into Top Secret Commands.
Enabling z/OS authorized services in Liberty for z/OS
Liberty on z/OS® offers the ability for your applications to take advantage of z/OS authorized services for System Authorization Facility (SAF) authorization, Workload Manager (WLM), resource recovery services (RRS), and SVCDUMP. If your application requires these services, set up a Liberty angel process and grant access for your Liberty server to use these services.
About this task
To use the z/OS Authorized Services, you can set up the following types of profiles using a SAF security product such as RACF®:
Note: You do not need to set up RACF if you are not planning to run the Liberty server as a Started Task and you are not planning to use any of the authorized services.
Procedure/Top Secret Commands:
**The below command assumes that you have already created the user acid WLPUSER0 and the GROUP acid WASUSER. Issue a TSS LIST(acid) for each of these and see if they are created. If not use the below CREATE commands. We do not know if the acids need any other permits then what is in this document.**
TSS CREATE(WLPUSER0) TYPE(USER) PASS(xxxx,0) NAME('WLP0 USER') DEPT(dept)
TSS CREATE(WASUSER) TYPE(GROUP) NAME('WASUSER GROUP') DEPT(dept)
TSS ADD(WASUSER) GID(nnn)
rdef started bbgzangl.* uacc(none) stdata(user(WLPUSER0)group(wasuser) privileged(no) trusted(no) trace(yes))
TSS ADD(STC) PROCNAME(BBGZANGL) ACID(WLPUSER0)
TSS ADD(WLPUSER0) GROUP(WASUSER)
**The below command assumes that you have already created the user acid WLPUSER1.
Issue a TSS LIST(acid) ese and see if it is created. If not use the below create command.**
TSS CREATE(WLPUSER1) TYPE(USER) PASS(xxxx,0) NAME('WLP1 USER') DEPT(dept)
rdef started bbgzsrv.* uacc(none) stdata(user(WLPUSER1)group(wasuser) privileged(no) trusted(no) trace(yes))
TSS ADD(STC) PROCNAME(BBGZSRV) ACID(WLPUSER1)
TSS ADD(WLPUSER1) GROUP(WASUSER)
**The below command assumes that you have already created the RESCLASS of SERVER.
It is most likely that this RESCLASS is already defined.**
TSS ADD(dept) SERVER(BBG.)
permit bbg.angel class(server) access(read) id(wlpuser1)
TSS PERMIT(WLPUSER1) SERVER(BBG.ANGEL) ACCESS(READ)
Already done above.
permit bbg.authmod.bbgzsafm class(server) access(read) id(wlpuser1)
TSS PERMIT(WLPUSER1) SERVER(BBG.AUTHMOD.BBGZSAFM) ACCESS(READ)
Already done above.
permit bbg.authmod.bbgzsafm.safcred class(server) access(read) id(wlpuser1)
TSS PERMIT(WLPUSER1) SERVER(BBG.AUTHMOD.BBGZSAFM.SAFCRED) ACCESS(READ)
Already done above.
permit bbg.authmod.bbgzsafm.zoswlm class(server) access(read) id(wlpuser1)
TSS PERMIT(WLPUSER1) SERVER(BBG.AUTHMOD.BBGZSAFM.ZOSWLM) ACCESS(READ)
Already done above.
permit bbg.authmod.bbgzsafm.txrrs class(server) access(read) id(wlpuser1)
TSS PERMIT(WLPUSER1) SERVER(BBG.AUTHMOD.BBGZSAFM.TXRRS) ACCESS(READ)
Already done above.
permit bbg.authmod.bbgzsafm.zosdump class(server) access(read) id(wlpuser1)
TSS PERMIT(WLPUSER1) SERVER(BBG.AUTHMOD.BBGZSAFM.ZOSDUMP) ACCESS(READ)
TSS PERMIT(WLPUSER1) SERVER(BBG.AUTHMOD.BBGZSAFM.LOCALCOM) ACCESS(READ)
permit bbg.authmod.bbgzsafm.wola class(server) access(read) id(wlpuser1)
TSS PERMIT(WLPUSER1) SERVER(BBG.AUTHMOD.BBGZSAFM.WOLA) ACCESS(READ)
Already done above.
permit bbg.authmod.bbgzsafm.prodmgr class(server) access(read) id(wlpuser1)
TSS PERMIT(WLPUSER1) SERVER(BBG.AUTHMOD.BBGZSAFM.PRODMGR) ACCESS(READ)
Already done above.
permit bbg.authmod.bbgzscfm class(server) access(read) id(wlpuser1)
TSS PERMIT(WLPUSER1) SERVER(BBG.AUTHMOD.BBGZSCFM) ACCESS(READ)
Already done above.
permit bbg.authmod.bbgzscfm.wola class(server) access(read) id(wlpuser1)
TSS PERMIT(WLPUSER1) SERVER(BBG.AUTHMOD.BBGZSCFM.WOLA) ACCESS(READ)