5.2.3.1.2 Determining Security Parameters for Outbound Requests
If security is to be enforced by both the local domain and the host system for each request outbound from the local domain, the following settings must be configured:
- The
UBBCONFIG
fileSECURITY
parameter must be set to one ofUSER_AUTH
,ACL
, orMANDATORY_ACL.
- The
DMCONFIG
fileDM_LOCAL_DOMAINS
sectionSECURITY
parameter must be set toDM_USER_PW.
- The
DMCONFIG
fileDM_SNALINKS
SECURITY
parameter must be set toIDENTIFY
orVERIFY.
- The SNA stack must be configured with the appropriate parameter
for
IDENTIFY
orVERIFY
. - The
ATTACHSEC
level for the connection definition in the host system must be set toIDENTIFY
orVERIFY
to match theDMCONFIG
fileDM_SNALINKS
SECURITY
parameter.
Configurations on Oracle Tuxedo Side
The following table shows settings for the SECURITY
parameters in the UBBCONFIG
and DMCONFIG
files required to achieve local domain and host system security
combinations for outbound requests.
Note:
Security setting combinations other than those shown in the tables will have unpredictable results.Table 5-2 Security Settings for Outbound Requests from Local Domain
Security Combinations | Settings | ||||
---|---|---|---|---|---|
Local | Host | UBBCONFIG SECURITY
|
DM_LOCAL_DOMAIN S SECURITY
|
DM_SNALINKS SECURITY
|
Remote Verification |
No | No | NONE or APP_PW
|
NONE or APP_PW
|
Not Applicable | |
Yes | No | USER_AUTH, ACL, or MANDATORY_ACL
|
DM_USER_PW
|
Not Applicable | |
No | Yes | NONE or APP_PW
|
NONE or APP_PW
|
INVALID | |
Yes | Yes | USER_AUTH, ACL, or MANDATORY_ACL
|
DM_USER_PW
|
UID or UID+PW |
For a request sent to the host system, the local principal user
ID is located in the domain security table and the associated
remote user ID, or user ID and password, are put into the
conversation start-up request before being sent over the LU6.2
conversation. This situation occurs if SECURITY
is set
to IDENTIFY
or VERIFY
in the
DM_SNALINKS
section of the DMCONFIG
file.
If the direct user ID mapping option is specified, the local
principal user ID is put into the conversation startup request.
Configurations on Mainframe Side
On Mainframe side, set the following:
- Set these parameters to
YES
in the CICS system initialization configuration file:SEC=YES XTRAN=YES
When they are specified, only the users defined can access corresponding transactions. You can define valid users in the profile using RACF, for example:
PERMIT * CLASS(TCICSTRN) ID(GUMENG) ACCESS(READ)
* can be replaced by the transaction name if you want to control individual transaction. - Configure the SNA stack with the appropriate parameter for
IDENTIFY
orVERIFY
. - Set the
ATTACHSEC
level for the connection definition in the host system toIDENTIFY
orVERIFY
to match theDMCONFIG
fileDM_SNALINKS SECURITY
parameter.
Parent topic: Determining Security Parameters