Applying the required RACF® (or equivalent) rules
The Fault Analyzer web interface requires a set of rules to be implemented in your z/OS® security system.
Many of these sample rules include placeholders where you can provide values tailored to your
installation environment, including:
- <ServerUserId>
- The user ID that the two server jobs (started tasks) run under
- <UserId>
- The user ID of someone who has been granted access to use the Fault Analyzer web interface (optional)
To allow the Fault Analyzer web interface to provide appropriate
access to z/OS® resources, the
following RACF® (or equivalent)
rules must be applied:
RDEF SERVER BBG.ANGEL UACC(NONE)
PERMIT BBG.ANGEL CLASS(SERVER) ACCESS(READ) ID(<ServerUserId>)
RDEF SERVER BBG.AUTHMOD.BBGZSAFM UACC(NONE)
PERMIT BBG.AUTHMOD.BBGZSAFM CLASS(SERVER) ACCESS(READ) ID(<ServerUserId>)
RDEF SERVER BBG.AUTHMOD.BBGZSAFM.SAFCRED UACC(NONE)
PERMIT BBG.AUTHMOD.BBGZSAFM.SAFCRED CLASS(SERVER) ACCESS(READ) ID(<ServerUserId>)
RDEFINE SERVER BBG.SECPFX.IDIZDFLT UACC(NONE)
PERMIT BBG.SECPFX.IDIZDFLT CLASS(SERVER) ACCESS(READ) ID(<ServerUserId>)
SETROPTS RACLIST(SERVER) GENERIC(SERVER) REFRESH
To facilitate user authentication and authorization, the following
rules must be customized to suit your environment. The last two rules
control user access to the Fault Analyzer web interface. Access can
be granted to specific user IDs, or a UACC of READ can be used to
give global access.
Note: Providing a UACC(READ) does not change the
security checks made for individual history file data sets, it is
just controlling access to the web application itself.
RDEFINE FACILITY BBG.SYNC.IDIZDFLT UACC(NONE)
PERMIT BBG.SYNC.IDIZDFLT ACCESS(CONTROL) CLASS(FACILITY) ID(<ServerUserId>)
SETROPTS RACLIST(FACILITY) GENERIC(FACILITY) REFRESH
RDEFINE EJBROLE IDIZDFLT.IDIGWEB.AllAuthenticated UACC(NONE)
PERMIT IDIZDFLT.IDIGWEB.AllAuthenticated CLASS(EJBROLE) ACCESS(READ) ID(<UserId>)
SETROPTS RACLIST(EJBROLE) GENERIC(EJBROLE) REFRESH
RDEFINE APPL IDIZDFLT UACC(NONE)
PERMIT IDIZDFLT CLASS(APPL) ACCESS(READ) ID(<UserId>)
SETROPTS RACLIST(APPL) GENERIC(APPL) REFRESH
An
unauthenticated usermust be added for newer versions of Liberty, which is used to treat users who have not yet authenticated. Define WSGUEST, which will reside in the WSGUESTG group, as the default unauthenticated ID that Liberty will search for.
ADDGROUP WSGUESTG SUPGROUP(SYS1)OWNER(SYS1)
DATA('WAS Unauthenticated User Group')
OMVS(AUTOGID)
ADDUSER WSGUEST DFLTGRP(WSGUESTG) OWNER(SYS1)
OMVS(AUTOUID
HOME(/u/WSGUEST)
PROGRAM(/bin/sh))
NAME('WAS unauth')
NOPASSWORD NOOIDCARD
RESTRICTED
PERMIT IDIZDFLT CLASS(APPL) ID(WSGUEST) ACCESS(READ)