Zsec Visualclient
Zsec Visualclient
Version 2.3.0
Client Manual
IBM
SC27-5647-04
zSecure Visual
Version 2.3.0
Client Manual
IBM
SC27-5647-04
Note
Before using this information and the product it supports, read the information in “Notices” on page 155.
August 2017
This edition applies to version 2, release 3, modification 0 of IBM Security zSecure Visual (product number
5655-N20) and to all subsequent releases and modifications until otherwise indicated in new editions.
© Copyright IBM Corporation 1998, 2017.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
About this publication . . . . . . . . v Setting interface options according to your access
zSecure documentation . . . . . . . . . . . v level . . . . . . . . . . . . . . . . . 27
Obtain licensed documentation . . . . . . . v Setting the date format . . . . . . . . . . 28
IBM zSecure Suite library . . . . . . . . . vi Drag and drop function . . . . . . . . . . 30
IBM zSecure Manager for RACF z/VM library viii Copy and paste function . . . . . . . . . . 30
Related documentation. . . . . . . . . . . ix Toolbar buttons . . . . . . . . . . . . . 30
Accessibility . . . . . . . . . . . . . . xi Right mouse button . . . . . . . . . . . 31
Technical training . . . . . . . . . . . . xi Naming conventions . . . . . . . . . . . 31
Support information . . . . . . . . . . . xi Changing column sequences. . . . . . . . . 31
Statement of Good Security Practices . . . . . . xi Site-specific columns and fields . . . . . . . . 31
Saving and exporting printable data . . . . . . 32
Chapter 1. IBM Security zSecure Visual Printing . . . . . . . . . . . . . . . 32
Previewing a print file . . . . . . . . . . 33
setup and configuration . . . . . . . . 1 Tables available for printing . . . . . . . . 33
Release information . . . . . . . . . . . . 1 Server Information dialog . . . . . . . . . 33
Prerequisites for installation . . . . . . . . . 1 Display of the ? character. . . . . . . . . . 34
Installing IBM Security zSecure Visual . . . . . . 2
IBM Security zSecure Visual maintenance. . . . . 4
Uninstalling IBM Security zSecure Visual . . . . 4
Chapter 3. RACF database operations 35
Modifying IBM Security zSecure Visual . . . . 5 Select Nodes dialog: multi-system options . . . . 36
Repairing IBM Security zSecure Visual. . . . . 5 Verification of actions across multiple systems . . . 37
Upgrading IBM Security zSecure Visual . . . . . 5 Using the Find dialog . . . . . . . . . . . 38
Configuring IBM Security zSecure Visual . . . . . 6 Ambiguous Class selection . . . . . . . . 42
Server definition parameters . . . . . . . . 7 Finding classes with the Select class dialog . . . . 42
Multiple Visual server definitions . . . . . . 9 Viewing connected users and groups . . . . . . 43
Copy function for multiple server definitions . . 10 Viewing the groups. . . . . . . . . . . . 43
Automated setup and configuration . . . . . . 10 Selecting resources for a specific user ID or group
Configuration file . . . . . . . . . . . 10 with the Permits function. . . . . . . . . . 45
Creating a configuration file . . . . . . . 10 Using Scope . . . . . . . . . . . . . . 46
Configuration file layout . . . . . . . . 11 Using Scope * . . . . . . . . . . . . . 50
Running a configuration file on the target Viewing RACF SETROPTS settings . . . . . . 52
machine . . . . . . . . . . . . . 12 Viewing an Access List . . . . . . . . . . 53
Updating server definitions from a Viewing an Effective Access List . . . . . . . 53
configuration file . . . . . . . . . . 12 Viewing a member list. . . . . . . . . . . 54
Configuration limitations . . . . . . . . 12
Modifying an existing configuration file . . . 12 Chapter 4. User management . . . . . 55
Notes . . . . . . . . . . . . . . 13 User table . . . . . . . . . . . . . . . 55
Configuration file sample tasks . . . . . . 13 MFA Factor management . . . . . . . . . 59
Silent installation . . . . . . . . . . . 14 MFA policy management . . . . . . . . . 61
Log file for silent installation . . . . . . 14 Viewing user properties . . . . . . . . . . 62
Examples of silent installation commands . . 15 Duplicating a user . . . . . . . . . . . . 66
Automate upgrade path examples . . . . . . 15 Deleting a user . . . . . . . . . . . . . 70
Resuming a user. . . . . . . . . . . . . 71
Chapter 2. IBM Security zSecure Visual Disabling a user . . . . . . . . . . . . . 71
Enabling a user . . . . . . . . . . . . . 72
customization and primary tasks . . . 17
Setting passwords (or passphrases) . . . . . . 73
Selecting to work locally or in a multi-system
Setting a default password (or passphrase) . . . . 76
environment . . . . . . . . . . . . . . 18
Removing the default password (or passphrase) . . 78
Logging on . . . . . . . . . . . . . . 19
About Schedules. . . . . . . . . . . . . 79
Selecting available nodes . . . . . . . . . 20
Viewing and editing schedules . . . . . . . 80
An example first task . . . . . . . . . . 21
Adding a schedule interval . . . . . . . . 81
Logging off . . . . . . . . . . . . . . 22
Repeating a schedule interval . . . . . . . 81
Exiting . . . . . . . . . . . . . . . . 22
Deleting a schedule interval . . . . . . . . 81
Turning off the server definition name . . . . . 22
Mappings . . . . . . . . . . . . . . . 82
Viewing the log files . . . . . . . . . . . 22
Viewing mappings . . . . . . . . . . . 82
Using the Communication window . . . . . . 24
Setting display preferences . . . . . . . . . 25
iv Client Manual
About this publication
IBM® Security zSecure™ Visual enables administrators to manage mainframe
security and administration from a Microsoft Windows workstation through a
Windows interface to the mainframe server. IBM Security zSecure Visual has two
components: IBM Security zSecure Visual Server and IBM Security zSecure Visual
Client. This publication describes how to install, configure, and use IBM Security
zSecure Visual Client.
Readers need to be familiar with RACF® administrative tasks and using Microsoft
Windows-based applications. This publication assumes that the IBM Security
zSecure Visual server mainframe component is installed and configured.
zSecure documentation
The IBM Security zSecure Suite and IBM Security zSecure Manager for RACF
z/VM libraries consist of unlicensed and licensed publications. This section lists
both libraries and instructions to access them.
Unlicensed zSecure publications are available at the IBM Knowledge Center for
IBM zSecure Suite (z/OS) or IBM zSecure Manager for RACF z/VM. The IBM
Knowledge Center is the home for IBM product documentation. You can customize
IBM Knowledge Center, create your own collection of documents to design the
experience that you want with the technology, products, and versions that you use.
You can also interact with IBM and with your colleagues by adding comments to
topics and by sharing through email, LinkedIn, or Twitter. For instructions to
obtain the licensed publications, see “Obtain licensed documentation.”
Table 1.
IBM Knowledge Center for
product URL
IBM zSecure Suite (z/OS) www.ibm.com/support/knowledgecenter/SS2RWS/
welcome
IBM zSecure Manager for RACF www.ibm.com/support/knowledgecenter/SSQQGJ/
z/VM welcome
The IBM Terminology website consolidates terminology for product libraries in one
location.
Unlicensed publications are available at the IBM Knowledge Center for IBM
zSecure Suite. Unlicensed publications are available to clients only. To obtain the
licensed publications, see Obtaining licensed publications. Licensed publications
have a form number that starts with L; for example, LCD7-5373.
The IBM Security zSecure Suite library consists of the following publications:
v About This Release includes release-specific information as well as some more
general information that is not zSecure-specific. The release-specific information
includes the following:
– What's new: Lists the new features and enhancements in zSecure V2.3.0.
– Release notes: For each product release, the release notes provide important
installation information, incompatibility warnings, limitations, and known
problems for the IBM Security zSecure products.
– Documentation: Lists and briefly describes the zSecure Suite and zSecure
Manager for RACF z/VM libraries and includes instructions for obtaining the
licensed publications.
– Related documentation: Lists titles and links for information related to zSecure.
– Support for problem solving: Solutions to problems can often be found in IBM
knowledge bases or a product fix might be available. If you register with IBM
Software Support, you can subscribe to IBM's weekly email notification
service. IBM Support provides assistance with product defects, answers
frequently asked questions, and helps to resolve problems.
v IBM Security zSecure CARLa-Driven Components Installation and Deployment Guide,
SC27-5638
Provides information about installing and configuring the following IBM
Security zSecure components:
– IBM Security zSecure Admin
– IBM Security zSecure Audit for RACF, CA-ACF2, and CA-Top Secret
– IBM Security zSecure Alert for RACF and CA-ACF2
– IBM Security zSecure Visual
– IBM Security zSecure Adapters for SIEM for RACF, CA-ACF2, and CA-Top
Secret
v IBM Security zSecure Admin and Audit for RACF Getting Started, GI13-2324
Provides a hands-on guide introducing IBM Security zSecure Admin and IBM
Security zSecure Audit product features and user instructions for performing
standard tasks and procedures. This manual is intended to help new users
develop both a working knowledge of the basic IBM Security zSecure Admin
and Audit for RACF system functionality and the ability to explore the other
product features that are available.
v IBM Security zSecure Admin and Audit for RACF User Reference Manual, LC27-5639
vi Client Manual
Describes the product features for IBM Security zSecure Admin and IBM
Security zSecure Audit. Includes user instructions to run the admin and audit
features from ISPF panels. This manual also provides troubleshooting resources
and instructions for installing the zSecure Collect for z/OS component. This
publication is available to licensed users only.
v IBM Security zSecure Admin and Audit for RACF Line Commands and Primary
Commands Summary, SC27-6581
Lists the line commands and primary (ISPF) commands with very brief
explanations.
v IBM Security zSecure Audit for ACF2 Getting Started, GI13-2325
Describes the zSecure Audit for CA-ACF2 product features and provides user
instructions for performing standard tasks and procedures such as analyzing
Logon IDs, Rules, Global System Options, and running reports. The manual also
includes a list of common terms for those not familiar with ACF2 terminology.
v IBM Security zSecure Audit for ACF2 User Reference Manual, LC27-5640
Explains how to use zSecure Audit for CA-ACF2 for mainframe security and
monitoring. For new users, the guide provides an overview and conceptual
information about using CA-ACF2 and accessing functionality from the ISPF
panels. For advanced users, the manual provides detailed reference information,
troubleshooting tips, information about using zSecure Collect for z/OS, and
details about user interface setup. This publication is available to licensed users
only.
v IBM Security zSecure Audit for Top Secret User Reference Manual, LC27-5641
Describes the zSecure Audit for CA-Top Secret product features and provides
user instructions for performing standard tasks and procedures. This publication
is available to licensed users only.
v IBM Security zSecure CARLa Command Reference, LC27-6533
Provides both general and advanced user reference information about the
CARLa Auditing and Reporting Language (CARLa). CARLa is a programming
language that is used to create security administrative and audit reports with
zSecure. The CARLa Command Reference also provides detailed information about
the NEWLIST types and fields for selecting data and creating zSecure reports.
This publication is available to licensed users only.
v IBM Security zSecure Alert User Reference Manual, SC27-5642
Explains how to configure, use, and troubleshoot IBM Security zSecure Alert, a
real-time monitor for z/OS systems protected with the Security Server (RACF)
or CA-ACF2.
v IBM Security zSecure Command Verifier User Guide, SC27-5648
Explains how to install and use IBM Security zSecure Command Verifier to
protect RACF mainframe security by enforcing RACF policies as RACF
commands are entered.
v IBM Security zSecure CICS Toolkit User Guide, SC27-5649
Explains how to install and use IBM Security zSecure CICS® Toolkit to provide
RACF administration capabilities from the CICS environment.
v IBM Security zSecure Messages Guide, SC27-5643
Provides a message reference for all IBM Security zSecure components. This
guide describes the message types associated with each product or feature, and
lists all IBM Security zSecure product messages and errors along with their
severity levels sorted by message type. This guide also provides an explanation
and any additional support information for each message.
v IBM Security zSecure Visual Client Manual, SC27-5647
Program directories are provided with the product tapes. You can also download
the latest copies from Program Directories.
v Program Directory: IBM Security zSecure CARLa-Driven Components, GI13-2277
This program directory is intended for the systems programmer responsible for
program installation and maintenance. It contains information concerning the
material and procedures associated with the installation of IBM Security zSecure
CARLa-Driven Components: Admin, Audit, Visual, Alert, and the IBM Security
zSecure Adapters for SIEM.
v Program Directory: IBM Security zSecure CICS Toolkit, GI13-2282
This program directory is intended for the systems programmer responsible for
program installation and maintenance. It contains information concerning the
material and procedures associated with the installation of IBM Security zSecure
CICS Toolkit.
v Program Directory: IBM Security zSecure Command Verifier, GI13-2284
This program directory is intended for the systems programmer responsible for
program installation and maintenance. It contains information concerning the
material and procedures associated with the installation of IBM Security zSecure
Command Verifier.
v Program Directory: IBM Security zSecure Admin RACF-Offline, GI13-2278
This program directory is intended for the systems programmer responsible for
program installation and maintenance. It contains information concerning the
material and procedures associated with the installation of the IBM Security
zSecure Admin RACF-Offline component of IBM Security zSecure Admin.
v Program Directories for the zSecure Administration, Auditing, and Compliance
solutions:
– 5655-N23: Program Directory for IBM Security zSecure Administration, GI13-2292
– 5655-N24: Program Directory for IBM Security zSecure Compliance and Auditing,
GI13-2294
– 5655-N25: Program Directory for IBM Security zSecure Compliance and
Administration, GI13-2296
Unlicensed publications are available at the IBM Knowledge Center for IBM
zSecure Manager for RACF z/VM. Licensed publications have a form number that
starts with L; for example, LCD7-5373.
The IBM Security zSecure Manager for RACF z/VM library consists of the
following publications:
v IBM Security zSecure Manager for RACF z/VM Release Information
For each product release, the Release Information topics provide information
about new features and enhancements, incompatibility warnings, and
Related documentation
This section includes titles and links for information related to zSecure.
See: For:
IBM Knowledge Center for All zSecure unlicensed documentation.
IBM Security zSecure For information about what is specific for a release, system
requirements, incompatibilities and so on, select the version
of your choice and About This Release; see “What's new”
and “Release notes”.
IBM Knowledge Center for Information about z/OS. Table 2 on page x lists some of the
z/OS most useful publications for use with zSecure.
For additional information about using IBM Security zSecure Visual, see these
publications:
v IBM Security zSecure CARLa-Driven Components Installation and Deployment Guide,
SC27-5638
Provides reference information for installing, configuring, and deploying IBM
Security zSecure Visual Server on a z/OS system.
v IBM Security zSecure Admin and Audit for RACF User Reference Manual, LC27-5639
Provides information about the IBM Security zSecure Admin and Audit for
RACF components and explains how to use the features from the ISPF panels. It
also describes RACF administration and audit user documentation as well as
troubleshooting resources and instructions for installing the zSecure Collect for
z/OS component. This publication is available to licensed users only.
v IBM Security zSecure CARLa Command Reference , LC27-6533
Provides both general and advanced user reference information about the
CARLa Auditing and Reporting Language (CARLa) programming language, that
can be used to create security administrative and audit reports with zSecure.
This publication is available to licensed users only.
Table 2. Some of the most useful z/OS publications for use with zSecure
Manual Title Order Number
z/OS Communications Server: IP Configuration Reference SC27-3651
z/OS Integrated Security Services Enterprise Identity Mapping SA23-2297
(EIM) Guide and Reference
z/OS MVS Programming: Callable Services for High Level SA23-1377
Languages
z/OS MVS System Commands SA38-0666
z/OS Security Server RACF Security Administrator's Guide SA23-2289
z/OS Security Server RACF Auditor's Guide SA23-2290
z/OS Security Server RACF Command Language Reference SA23-2292
z/OS Security Server RACF Macros and Interfaces SA23-2288
z/OS Security Server RACF Messages and Codes SA23-2291
z/OS Security Server RACF Security Administrator's Guide SA23-2289
z/OS Security Server RACF System Programmer's Guide SA23-2287
®
z/Architecture Principles of Operation SA22–7832
x Client Manual
Accessibility
Accessibility features help users with a physical disability, such as restricted
mobility or limited vision, to use software products successfully. With this product,
you can use assistive technologies to hear and navigate the interface. You can also
use the keyboard instead of the mouse to operate all features of the graphical user
interface.
Technical training
For technical training information, see the IBM Training and Skills website at
www.ibm.com/training.
See the zSecure Training page in the zSecure public Wiki for information about
available training for zSecure.
Support information
IBM Support provides assistance with code-related problems and routine, short
duration installation or usage questions. You can directly access the IBM Software
Support site at www.ibm.com/software/support/probsub.html.
For information about installing the zSecure Visual server on the mainframe, see
the IBM Security zSecure CARLa-Driven Components: Installation and Deployment
Guide. For information about known problems and limitations, see Release Notes in
About This Release on the IBM Knowledge Center for IBM Security zSecure V2.3.0 at
www.ibm.com/support/knowledgecenter/SS2RWS_2.3.0/
com.ibm.zsecure.doc_2.3.0/landing/about_this_release.html.
Release information
The zSecure release information includes details on new features and
enhancements, incompatibility warnings, and documentation update information.
You can find the latest versions of What's New and Release Notes in About This
Release on the IBM Knowledge Center for IBM Security zSecure V2.3.0 at:
www.ibm.com/support/knowledgecenter/SS2RWS_2.3.0/
com.ibm.zsecure.doc_2.3.0/landing/about_this_release.html.
To connect to the zSecure Visual server on the mainframe, install and configure
this software on the mainframe:
v Supported release of z/OS, up to V2R3
v RACF Security Server
v TCP/IP
v IBM Security zSecure Visual 2.3.0 server
After installation, you must create a server definition on the client to connect to the
mainframe. Determine these settings to prepare for the server definition:
v Server IP address or name
v Server TCP port number
v Client ID
v Initial password
You can install the new version of the IBM Security zSecure Visual client only once
on a workstation. You can upgrade from a previously installed version of the
client, for example, version 2.2.1. See “Upgrading IBM Security zSecure Visual” on
page 5 and "Compatibility of IBM Security zSecure Visual and zSecure
components" in IBM Security zSecure CARLa-Driven Components: Installation and
Deployment Guide for guidelines on upgrading the client.
You cannot install the new Visual client multiple times on the same workstation
but you can define multiple Visual server definitions in one client and run multiple
Visual client instances concurrently. See “Multiple Visual server definitions” on
page 9.
The zSecure Visual client software for Windows is available on CD. The CD also
contains the zSecure Visual client manual in PDF format.
2 Client Manual
Note: Information on installing and configuring the zSecure Visual server is in the
IBM Security zSecure CARLa-Driven Components: Installation and Deployment Guide.
You can either install a complete version or a custom version of the zSecure Visual
client program.
The Complete version of the installation program installs the Java Runtime. If you
want to continue using your current version of the Java Runtime, use the Custom
version of the installation and specify to bypass installing the Java Runtime.
Procedure
Note: You can print the terms of the license agreement by clicking Print. The
license files are in the \License subdirectory. You can view the license in
English and the locale language configured on the target system, but other
languages might not be viewable.
5. Select one of the following options and click Next.
Complete
Installs all program files in the default directory. This option is for
normal use and uses more disk space.
Custom
Provides two options for advanced users.
v If you do not want to install the program files in the default directory:
a. Click Change... to specify a different installation directory than
the default directory (C:\Program Files (X86)\IBM\Security
zSecure Visual\2.3).
What to do next
Before you can use zSecure Visual, you must configure it. You can manually or
automatically configure it. For more information about configuration, see
“Configuring IBM Security zSecure Visual” on page 6.
If the installation does not complete without errors, you can examine the log file
for information to help troubleshoot the causes. The information is detailed and
intended for expert use.
You can uninstall, modify, and repair IBM Security zSecure Visual. This section
provides the procedures to perform these tasks.
A fix pack is provided as a zip file. Installing it effectively overwrites the existing
instance of the Client.
4 Client Manual
Procedure
To completely remove IBM Security zSecure Visual and all of its components,
perform these steps:
1. Go to the Control Panel.
2. Select Programs and Features.
3. Select IBM Security zSecure Visual 2.3.0.
4. When the uninstall program detects a shared file, you get a warning message.
Click Yes to continue. Maintenance starts to remove IBM Security zSecure
Visual.
When Maintenance is complete, the Maintenance Complete window is
displayed.
If you are an advanced user, you can modify your Visual client installation to add
new program components or remove currently installed components.
Procedure
If you find damaged files, reinstall all program components. To reinstall all
program components, perform these steps:
Procedure
1. Start Control Panel and select Programs and Features.
2. Right-click IBM Security zSecure Visual 2.3.0 and select Repair.
3. After the repair process completes, click Finish.
This procedure creates a new server definition in the new client that uses a copy of
the old certificate and points to the new server. Copying the old certificate enables
you to perform the upgrade process without having to create a new initial
password for the client.
Procedure
You configure IBM Security zSecure Visual by defining the Visual server to the
client and by defining the Visual client to the Visual server. This topic describes
how to define the Visual server to the client. See “Maintaining client definitions”
on page 151 for information on adding client definitions to the Visual server.
The location where Visual server definitions are stored depends on the selection
made in the View -> Options menu.
If the Save server definitions in per-user folder check box is not selected, then the
server definitions are stored in the ProgramData folder C:\ProgramData\IBM\
Security zSecure Visual\2.3\Servers; this is the default location. The
ProgramData folder contains application data for all users of the system. The Visual
server definitions are available for all users who log on to that system.
6 Client Manual
If the Save server definitions in per-user folder check box is selected, then the
server definitions are stored in the user-level AppData folder, for example:
C:\Users\User1\AppData\Roaming\IBM\Security zSecure Visual\2.3\Servers. The
AppData folder contains application data for a specific user of the system. The
Visual server definitions are available for this user only. Server definitions that are
stored in the AppData folder become part of the roaming profile for that user.
Therefore, the same user can use the server definitions in multiple systems in a
networked environment without having to configure every system.
Procedure
1. If no servers have been defined to the client, you enter the configuration part of
the program automatically after you start the program. Otherwise you can
select File > Configure from the main menu.
The configuration window displays all defined servers and enables you to add,
copy, edit, and delete server definitions. When "Edit required" is displayed in
the list, you must complete the corresponding server definition before you can
use the server.
With the Import function, you can read server definition information from a
configuration file prepared for you. With Export, you can create configuration
files, which enables automatic setup and configuration.
2. After adding, editing or deleting one or multiple server definitions, click OK to
apply all changes. A status window is displayed, showing the steps performed
to configure the program.
A server definition contains the parameters listed in this section. After completing
the fields, click OK to accept them. You can use Test Connection to verify if the
server is active. You can leave all fields blank except Name and complete the
definition in another run of IBM Security zSecure Visual.
To use the server, you need a certificate. When you enter the correct initial
password, you get the certificate.
Attention: When you obtain a new certificate, ensure that the clock of your local
workstation is synchronized with the mainframe server clock. Out-of-synch clocks
can cause errors.
Refer to this list for information about the server definition parameters:
Name This arbitrary name refers to this specific server definition. It is displayed
in the Logon dialog. The name must be unique on the PC. The name must
be a valid filename for Windows, because a subdirectory is created to store
files related to the server.
HelpContact (optional)
Enter the name of a person, department name, or anything else that
informs the user who to contact in case of trouble. If the field is nonblank
it is displayed in error dialogs as follows: Error 3: Time Out. Contact
helpcontact.
Client ID
This number uniquely identifies the client to its server. It is always 12.1.n,
where n is an integer between 2 - 2,147,483,647. Typically these IDs are
defined on the server. Before you can use a client, you must ask for its ID,
and enter it here.
Server IP address or name
The IP address or the fully qualified host name of the server.
Server Port
The port that the server agent listens to. A port number is a number 0 -
65535. If you are configuring multiple server definitions to connect to
multiple zSecure server instances, see “Multiple Visual server definitions”
on page 9 for guidelines on specifying port values.
8 Client Manual
Local port (optional)
The client agent uses two port numbers to communicate with the server
and with the user interface. By default these port numbers are the server
port number and the server port number + 1. If there are two servers with
equal port numbers, port conflicts occur. With this field, you can override
the default local port number. The user interface uses local port number +
1. If you are configuring multiple server definitions to connect to multiple
zSecure Server instances, see “Multiple Visual server definitions” for
guidelines on specifying port values.
Initial password
A 10 digit hex password required to obtain a new certificate. The certificate
is used for encryption. Usually the initial password can be obtained from
your mainframe system administrator.
Test connection
To verify if the Server IP address or fully qualified host name and the
Server Port are correct, click Test Connection. After some time Connect
succeeded or Connect failed is displayed in the status field.
Note: Connection fails if the server parameters are correct but the server is
not running.
You cannot install the new Visual client multiple times on the same workstation,
but you can define multiple Visual server definitions in one client. You can run
multiple Visual client instances (sessions) concurrently. You can use each session to
administer different RACF databases, based on the server configuration that you
select when you log on to a Visual server.
If you configure the zSecure Server to service multiple nodes, the Visual server
using that zSecure Server can administer two or more nodes and RACF databases
in a single session. You must run the client in multi-system mode to administer
multiple nodes (and RACF databases) in a single session. See “Selecting to work
locally or in a multi-system environment” on page 18.
To administer multiple Visual servers concurrently, you must ensure that a unique
port number is used by each Visual server. For example, if you create two or more
Visual server definitions using server TCP 8000, the Visual client tries to use the
same local port number (base port+1=8001) for the traffic coming from each server.
This will cause port conflict problems and must be avoided. Here are two ways
you can configure multiple Visual servers to avoid a port-use conflict:
v Run the Visual servers on different port numbers. For example, if server X uses
port 8000, server Y uses port 8010, and server Z uses port 8020, the Visual client
automatically uses the local ports 8001, 8011, and 8021, respectively, to
communicate with the three servers.
v If the Visual servers are already running using the same port number, for
example, port 8000, you can use the Local port field in the server definition
dialog to separate the traffic coming from the different servers. For example, you
can leave the Local port field blank in the server definition for server X, which
results in that server using port 8001. For server Y, you can specify local port
number 8010, and for server Z specify port number 8020.
A client needs a definition for each server to access, see “Server definition
parameters” on page 7. However, it is not always necessary to enter the whole
definition from scratch. You can copy server definitions between different versions
of IBM Security zSecure Visual. Avoid port conflicts when doing so. If needed,
consult your system administrator.
The Copy function shows you an exact copy of the existing server definition. Some
of the fields in the definition are disabled so that you cannot change them.
Configuration file
Use a configuration file to distribute configuration parameters for zSecure Visual.
With the configuration file, you do not have to type the same information again.
You write parameters to a file. The target computers read it during their setup and
configuration.
When you create the configuration file, the changes do not affect your PC. All the
server and setup data options you configure are saved to a file.
Procedure
10 Client Manual
Figure 3. Configuration dialog in export mode
The settings that define a server are in a Server section. A configuration file can
contain more than one Server section.
NAME=server_definition_name
Specifies the server definition name.
CLIENTID=12.1.n
Specifies the Client ID, where n is an integer between 2 - 2,147,483,647.
SERVERIP=Servername
Specifies the IP address or hostname of the server.
SERVERPORT=8000
Server IP port.
HELPCONTACT=System support
Specifies the help contact, as shown in the error dialogs.
Procedure
v On the target machine, run setup with the configuration filename as a
command-line argument:
<full path>\setup /s /v"CMDVISUAL=<full path to configuration file>"
Attention:
– You must specify the CMDVISUAL option in uppercase.
– IBM Security zSecure Visual can find the configuration file only if you specify
the full path.
v When installation is finished, setup starts IBM Security zSecure Visual with the
configuration file as an input parameter.
Procedure
v On the target machine, run IBM Security zSecure Visual with the configuration
filename as a command-line argument:
<full path>\c2racvn <full path to configuration file>
v The server definitions are updated according to the parameters found in the
configuration file. After this update, the program exits directly.
Configuration limitations
Use the configuration limitation guidelines to create zSecure Visual configuration
files.
You can modify an existing configuration file. See “Notes” on page 13 for
guidelines on changing or using configuration files.
12 Client Manual
Procedure
Notes
The administrator uses these guidelines to create and change zSecure Visual
configuration files.
Using a configuration file to copy a certificate
You can copy a certificate using a configuration file. When you prepare the
configuration file, perform the copy as if it is on your system. The copying
is performed on the target machine when it reads the configuration file. To
copy a certificate that is not on the machine where you are making the
configuration file, you can enter the server name and version directly.
Blank fields in configuration files
Server parameters that you leave blank are not stored in the configuration
file. If a server with the same name exists on the target machine, blank
fields are left unchanged.
Client IDs in configuration files
The target computers must have unique Client IDs. You cannot specify a
Client ID in a configuration file that is used by multiple target computers.
If you specify a dot in the Client ID field after 12.1, the target machine
replaces the dot by the Client ID of its other server definitions. This only
works if all its other server definitions contain the same Client ID.
Modifying an existing configuration file
See “Modifying an existing configuration file” on page 12 for the steps.
Procedure
1. Example 1: Prepare automated setup and configuration with one server for
multiple clients
a. Start IBM Security zSecure Visual.
b. Select File > Configure from the main menu.
c. Select Export and confirm you are going to prepare configuration files.
d. Edit the server definitions using the Add, Edit, and Delete functions until
you have only the server definition you want to configure on the target
machines.
Specify only Name, HelpContact, Server IP address or name and Server
Port. Leave the Client ID field blank, because this field needs to be unique
for each target machine. In this example, Local Host and Local Port are also
left blank.
e. Click OK and save the configuration file as setup2.cfg. Now the
configuration file is finished.
f. On each target machine run this command:
c2racvn setup2.cfg
Silent installation
Follow these guidelines to plan a silent installation of zSecure Visual.
For the silent installation to succeed, the initial machine and target machines must
have similar configurations. Any deviation that can influence the setup procedure,
such as the existence or nonexistence of the target folder to install, can cause the
installation to fail.
Silent installation assumes that the accepted license agreement recorded from the
initial installation applies to all target machines. Therefore, the silent installation
copies the license files to the designated directory on the target systems and creates
the status file without user interaction.
To help troubleshoot any silent installation problems, you must log the installation
process. See “Log file for silent installation”
A log file is created for each silent installation. If you do not specify the location,
the log file is created as setup.log in the folder that contains
zSecureVisualSetup.exe.
For diagnostics, you can create a detailed log with this command-line option:
14 Client Manual
The detailed log contains the steps of the installation process, including any error
messages. This information must provide pointers to solve what went wrong
during the installation.
Attention: Take care to avoid any filename conflicts with the setup log!
These examples use standard Microsoft command line parameters with the
InstallShield setup command. Only the CMDVISUAL property is specific to the
zSecure Visual client application.
Specify command-line options that require a parameter with no space between the
option and its parameter. For example, this command is valid:
zSecureVisualSetup.exe /v"INSTALLDIR=c:\MyDirectory"
Put quotation marks around the parameters of an option only if the parameter
contains spaces.
If a path in a parameter contains spaces, you might need to use quotation marks in
quotation marks, as in this example:
zSecureVisualSetup.exe /v"INSTALLDIR=\"c:\My Directory\""
Silent installation with default settings
zSecureVisualSetup.exe /s /v"/qn”
Silent installation with a different target directory
zSecureVisualSetup.exe /s /v"/qn INSTALLDIR=<c:\target_directory>"
Silent installation with a different target directory and a configuration file
zSecureVisualSetup.exe /s /v"/qn CMDVISUAL=C:\temp\setup1.cfg
INSTALLDIR=<c:\target_directory>"
Silent installation with a different target directory and a log file
zSecureVisualSetup.exe /s /v"/l*v c:\test.log
"INSTALLDIR=<c:\target_directory> /qb"
Silent installation with default settings and no reboot
zSecureVisualSetup.exe /s /v"/qn /norestart ”
After an initial installation, IBM Security zSecure Visual needs some configuration
before the user can log on to a server. For an upgrade, it can be automated with
the /COPYSERVERS setup command-line option. Any server definition already
defined on the system is replicated to the newly installed version, so they are
ready for use immediately after installation.
Examples:
Note: If the machine contains more than one version of zSecure Visual, the
server definitions of the most recent version are copied. Older versions are
skipped.
Example 1:
zSecureVisualSetup.exe /s /v"/qn CMDVISUAL=/COPYSERVERS”
Example 2:
The following example specifies to uninstall the existing version of the Visual
Client before installing the new version.
zSecureVisualSetup.exe /x /s /v"/qn CMDVISUAL=/COPYSERVERS”
16 Client Manual
Chapter 2. IBM Security zSecure Visual customization and
primary tasks
IBM Security zSecure Visual maintains an IBM RACF security database from a
Windows workstation. Some customization and primary tasks are described in the
following topics.
“Release information” on page 1
“Selecting to work locally or in a multi-system environment” on page 18
To limit or expand the scope of your task, you can work with users and
resources on the local RACF database or with users and resources that are
defined in multiple nodes across multiple systems.
“Logging on” on page 19
You log on to the Visual client so that the program can determine your scope of
operation.
“Selecting available nodes” on page 20
If you log on in multi-system mode, the zSecure server is queried for a list of
available nodes. The nodes that are defined in the zSecure server are made
available to the Visual client. Select the zSecure and RACF Remote Sharing
Facility (RRSF) nodes that you want to work with.
“An example first task” on page 21
As an example first task, you can use the user interface to perform various
operations related to users, groups, and resources.
“Logging off” on page 22
You log off the Visual client after completing your tasks.
“Exiting” on page 22
You exit the Visual client after logging off the Visual Server.
“Turning off the server definition name” on page 22
You can create a simple file and entry to turn off the displaying of the server
definition name in the Visual client.
“Viewing the log files” on page 22
You can view logged information about the Visual application in the cesys and
ceaud files.
“Using the Communication window” on page 24
Use the Communication window to view information exchanged between the
zSecure Visual client and the components and programs on the mainframe side.
“Setting display preferences” on page 25
Use the Option dialog to specify how you want to display IBM Security
zSecure Visual.
“Setting interface options according to your access level” on page 27
You can adjust the interface to display specific groups of options, according to
the access level you are assigned.
“Setting the date format” on page 28
You can define your own format or select a predefined format to display dates.
“Drag and drop function” on page 30
You can use the drag and drop function to change users or connects in the
RACF database.
“Copy and paste function” on page 30
You can use the Copy, Paste, and Paste Special functions to perform various
copy, merge, and move tasks.
Procedure
v To work locally, ensure that the Use zSecure Server for multi-system services
option is not selected in the Options dialog of the Visual client. By default, this
option is not selected. When operating in local mode, the Visual client does not
request node details from the zSecure server.
v To work with users and resources in a multi-system environment, set the Visual
client to operate in multi-system mode. Use these steps to specify multi-system
mode:
1. Select Start > Programs > Security zSecure Visual to start the Visual client.
18 Client Manual
2. Select View > Options to start the Options dialog (see “Setting display
preferences” on page 25).
3. Select Use zSecure Server for multi-system services > OK.
You are prompted to accept the list of systems that are configured for the
multi-system environment or to specify the systems to which your actions
will apply for the session.
Note: If the client cannot establish a session with the zSecure server, the
client issues a message indicating that the server is not active. It begins
operation in local mode.
Logging on
You log on to the Visual client so that the program can determine your scope of
operation.
After starting the program you must logon to RACF to determine your access to
certain commands, as CKG profiles in the RACF database control your access
levels. Based on responses from the CKGRACF program on the mainframe, the
names of the schedules you can work with are loaded and certain features are
disabled. Next, a list of all classes defined on the complex is presented.
Procedure
Note: If this logon is your first logon to the mainframe, it takes time to set up
a cryptographically secure communication channel.
5. If you log on in multi-system mode, you are prompted to select the nodes that
you want to work with. See “Selecting available nodes” on page 20
The list of nodes includes zSecure nodes and RRSF nodes, which are displayed in
the Node selection dialog. Use these guidelines to help determine which nodes
you want to work with:
v You must select at least one zSecure node to continue. The Visual client sends
your request to the server, which directs it to the zSecure node. The node returns
data from the associated RACF database. After the client receives data, it can
send requests to the zSecure node to change the data.
v Nodes that you can operate on only as zSecure nodes are listed only in the
zSecure Nodes column.
v Nodes that you can operate on only as RRSF nodes are listed in the RRSF
Nodes column.
v Nodes that are listed in the same row under the zSecure Nodes column and the
RRSF Nodes column are available in both environments.
v The nodes you select become your list of preferred nodes. You change your
preferred zSecure and RRSF nodes using the Select Nodes dialog (see “Select
Nodes dialog: multi-system options” on page 36). You can also change your
preferred list of zSecure nodes by selecting >>Advanced in the Find dialog.
v Operations that you perform on RRSF nodes are not verified for successful
completion. You can send edit requests to a RACF database through an RRSF
node. However, the client does not receive feedback on the final outcome of the
action. Consequently, the software assumes that RRSF operations are successful.
20 Client Manual
Figure 5. Node Selection dialog
The following procedure describes an example task that shows how to use the user
interface to view the connections between users and groups. See Chapter 6,
“Connect management,” on page 97 for more information on performing connect
tasks.
Procedure
1. In the Find dialog window, select User or Group from the Class drop-down
list.
2. Type a user or group in the Search field and click OK. A search results window
is displayed.
3. To view what the connections are for the selected user or group, follow these
steps:
a. Select a specific user or group from the search results window.
Logging off
You log off the Visual client after completing your tasks.
Procedure
Select File > Logoff from the main menu to log off IBM Security zSecure Visual.
Exiting
You exit the Visual client after logging off the Visual Server.
Procedure
1. To exit IBM Security zSecure Visual, select File > Exit from the main menu.
2. Specify whether the program prompts for a confirmation on exit in the Option
dialog.
For more information, see the section “Setting display preferences” on page 25.
If you press Exit while you are still on IBM Security zSecure Visual, the
program logs off before exiting.
The IBM Security zSecure Visual client includes the server definition name in the
application title. The server definition name is enclosed between square brackets.
By default, the application turns on the server name definition during logon and
turns it off during logoff, but you can turn off this feature.
Procedure
To turn off the server definition name in the application title, follow these steps:
1. Go to the application folder. The default directory is C:\Program Files
(x86)\IBM\Security zSecure Visual\2.3\.
2. Create a text file named c2racvn.cfg.
3. Add this option:ShowHost=No
4. Save the file.
5. Exit and log on again for the change to take effect.
22 Client Manual
About this task
The zSecure Visual client provides log files to capture errors, warnings, and
informational messages that can help locate the source of a problem and diagnose
its severity.
Procedure
Follow these steps to access the log files:
1. Navigate to the log directory:
user_profile\AppData\Roaming\IBM\Security zSecure Visual\version\
Servers\ServerName\ClientLogs
Example directory: C:\Administrator\AppData\Roaming\IBM\Security zSecure
Visual\version\Servers\ServerName\ClientLogs
Various logs are recorded in this directory. The log files include the process
identifier in the titles, so multiple versions from different runs of the client can
be stored in the same directory. Here is an example of same-named files that
are differentiated by process identifiers:
About0480.log
CKGPRINT0480.log
Requests0480.log
SYSPRINT0480.log
SYSTERM0480.log
About6412.log
CKGPRINT6412.log
Requests6412.log
SYSPRINT6412.log
SYSTERM6412.log
You must provide these log files when reporting problems related to the
zSecure Visual client.
2. Navigate to the other log file directory. The location of the log directory
depends on whether the server definition is stored in the ProgramData or
AppData folder, as determined by the choice made in the View -> Options
dialog for the Save server definitions in per-user folder option.
If the Save server definitions in per-user folder check box was not selected
(default), the log file directory is stored in the ProgramData folder and the
directory is: C:\ProgramData\IBM\Security zSecure Visual\version\Servers\
ServerName. For example: C:\ProgramData\IBM\Security zSecure
Visual\2.3\Servers\Server_A.
If the Save server definitions in per-user folder check box was selected, then
the log file directory is stored in the AppData folder and the directory is:
user_profile\AppData\Roaming\IBM\Security zSecure Visual\version\
Servers\ServerName\. For example: C:\Users\UserA\AppData\Roaming\IBM\
Security zSecure Visual\2.3\Servers\Server1.
The log files named cesys and ceaud are stored in this directory. These log files
provide information about the communication layer between the client and
server. Though this information is not for user interpretation, it is useful to
diagnose communication-related problems. You must also provide these log
files when reporting problems related to the zSecure Visual client.
3. View the latest updates contained in these log files from the tabs of the
Communication window GUI.
Note: When you start the client it clears log files that are older than 7 days.
You can print the information found in the Communication window and export it
to rich text format (.rtf). See “Printing” on page 32 and “Saving and exporting
printable data” on page 32.
Procedure
2. Select the Requests tab to see all requests issued by the client, which include
the latest CARLa commands, CKGRACF commands, and commands sent to the
server. You can find the commands that are sent to the server under the
extension section of this tab.
3. Select the SYSTERM tab to view status messages and messages with a return
code (RC) of 12 or higher.
24 Client Manual
v If the most recent request is for CKRCARLA, the SYSPRINT tab contains the
detailed SYSPRINT output of the CKRCARLA program. The SYSPRINT
output includes CKRCARLA listings and critical and informational messages.
This information helps locate the command causing problems.
v If the most recent request is for CKGRACF, the CKGPRINT tab contains the
detailed CKGPRINT output of the CKGRACF program. The CKGPRINT
output includes CKGRACF commands and messages. This information can
help you locate a command causing problems. You can also view messages
returned directly from RACF.
4. Select the About tab to see aggregated client and server information. You can
copy and paste this information as text. From this tab, you can find:
v Client information: the specific version of zSecure Visual client and
information about the building of the GUI and its engine.
v Server information. See “Server Information dialog” on page 33.
v Copyright notice.
Procedure
26 Client Manual
Include access due to System Operations and Universal Groups in effective
Access List
Specifies whether the System Operations attributes and Universal
Group access determine the effective access list. By default, this option
is off.
CAUTION:
If you select this option, zSecure Visual must read the entire RACF
database to create an Effective Access List. It can cause a significant
drop in performance.
Include profiles you can list
Determines which profiles you can see and edit. When this option is
on, you see the profiles you can edit and the profile in your CKGLIST
and group-auditor scope. When it is off, you see only the profiles you
can edit. By default, this option is on.
5. When you finish the changes, perform one of these steps:
a. Click Restore defaults to set the options to factory defaults.
b. Click OK to accept the changes.
c. Click Cancel to close the Options dialog window without changing the
settings.
Use the Options dialog to adjust the interface according to your role as a user.
Procedure
v You can select one administration level from the Interface level drop-down list.
If you are not authorized to perform all functions of the particular level, the
options that you cannot access are either hidden or displayed in gray. If you
change the administration level, the Find dialog changes to adapt to that level.
These options are the administration levels for you to select:
Helpdesk
Helpdesk is the lowest level, the functionality is limited to:
– List users
– Resume a user
– Set password
– Manage schedules
– List mapping profiles
– View the mapping profiles of a user
Connect
This level expands the functionality from the Helpdesk level to:
– List groups
– List connects
– View the grouptree
– Create connects
28 Client Manual
About this task
The date format dialog specifies how dates are displayed. You can select one of the
predefined formats or build your own format.
Procedure
v Use these options to specify the predefined formats.
Windows short date
The Windows date formats are taken from the Windows configuration
settings. You can change these formats by selecting Control Panel >
Clock, Language, and Region and clicking on Change the data, time
and number format under the Region and Language option. The
modified format affects all applications that use the format.
Windows long date
See description of Windows short date.
CKRCARLA date format
This format is used by the CKRCARLA program on the mainframe,
which is dd mmm yyyy. This format has no special meaning or
advantages.
ISO date format
This format is yyyy-mm-dd.
Note: You can use the characters / and - as separators, but the separator
character defined in the Windows Control Panel > Clock, Language, and
Region settings can replace them. You can prevent replacement by placing a /
before the character.
Table 3. Date formatting characters
d one-digit day, two digits only if necessary
dd two-digit day
ddd day of week, three characters
dddd day of week, full name
m one-digit month, two digits only if necessary
mm two-digit month
mmm three-character month name
mmmm full month name
yy two-digit year
yyyy four-digit year
Use Copy, Paste, and Paste Special options on the main menu to perform these
tasks:
v Copy users, groups, connects, access lists, and member lists
v Create, merge, move, and copy connects
Toolbar buttons
You can use the Visual client toolbar buttons to show the most frequently used
menu options.
The toolbar buttons show the most frequently used menu options. When you
hover the mouse cursor over each button, a yellow pop-up with the description
displays.
30 Client Manual
Right mouse button
You can right-click a row to display Navigate and Action options.
In most tables and the group tree, right-click a row to display a pop-up menu with
frequently used Navigate and Action options.
Naming conventions
Use these guidelines to create names for users and groups.
When you add new users or groups, follow these naming conventions:
v The name must be from 1 to 8 characters long.
v The characters must be the letters A-Z, number 0-9, or #, $, @.
v The name cannot start with a number.
v A group cannot have the same name as another group.
v A group name cannot have same name as an existing user ID.
Procedure
You can rearrange the columns in a table and change the size of a column.
v To change the arrangement of the columns in a table, drag a column to where
you want it so you can compare columns. The column arrangement you make
becomes the default when you start the program next time.
v To change the size of a column, click a vertical border and move it left or right.
Double-clicking gives you the required size of a column.
Your site administrator can customize zSecure Visual to display user information
that is defined by your organization. For example, a site might want to display
employee IDs and department numbers. These fields are displayed in front of or
instead of the INSTDATA column for USER profiles.
If defined, site-specific fields are in the User properties dialog, User table, and the
Find dialog:
User properties
Site-specific columns can replace the InstData field or be included in
addition to the InstData field. Depending on the number of site-specific
fields, these fields can be displayed under a separate tab. The contents of
the fields are read-only.
You can save all printable tables as Comma Separated Values format (CSV).
Different programs, such as Microsoft Excel, can read this format. You can also
export the communication window to an RTF format. See “Using the
Communication window” on page 24.
Procedure
Printing
You can print data and see print previews in the Visual client.
Procedure
32 Client Manual
Previewing a print file
You can preview and change the layout of a print file in the Visual client.
Procedure
1. To get a print preview, select File >Print Preview from the main menu or click
the print preview icon on the toolbar.
2. Select PgUp or PgDown on your keyboard to scroll through the preview.
3. Select the desired printing option from the list of icons:
v Click the print icon to print the information as shown. All pages are printed.
v Select the zoom icon to specify the size of the text that is included on the
print page. The percentage values are: 10, 25, 50, 75, 100, 150, 200, and 500
percent.
v Select one of the page icons to view the page layout of 1 (default), 2, 3, 4, or
6 pages of the print file.
v Click Close to go back to the main program.
If you cannot print a table, the print and preview options are not active.
To view the server information, select Help > Server Information from the main
menu. The following information is available:
v Release information of the server CKRCARLA and CKGRACF
v Host name of the server and its IP port
v The possibly resolved value of the C2RSERVE parameter in the zSecure
configuration
v Time that the server established itself as a certificate authority
v Time that the server was last started.
If you find a ? in a field of a table, it means that this field is not loaded because it
is out of your scope.
34 Client Manual
Chapter 3. RACF database operations
Use the Visual client Navigate option to find and view users, groups, and
resources and their connects, permits, and schedules.
This chapter explains the different options you can use to work with the databases.
Click Navigate to go to the databases that you want to see. You can find
individual users, groups, and resources and their relations such as connects,
permits, schedules, and so on.
“Select Nodes dialog: multi-system options” on page 36
Specify the systems and nodes you want to work with in the Select Nodes
dialog.
“Verification of actions across multiple systems” on page 37
Use the Status of progress form to verify actions for each selected node in a
multi-system task.
“Using the Find dialog” on page 38
Use the Find dialog to view users, groups, or resources for one or more RACF
databases.
“Viewing connected users and groups” on page 43
Select Navigate > Connects to view connect relationships for users and groups.
“Viewing the groups” on page 43
You can view a group tree to understand the hierarchy of groups and
subgroups.
“Selecting resources for a specific user ID or group with the Permits function”
on page 45
You can select resources related to a specific user ID or group so that you can
see the resource profiles.
“Using Scope” on page 46
Use the various filtering options in the Scope dialog to view users, groups, and
resources that can be accessed by a specific user ID or group.
“Using Scope *” on page 50
Use the various filtering options in the Scope * dialog to view users, groups,
and resources that can be accessed by every user.
“Viewing RACF SETROPTS settings” on page 52
Use the RACF SETROPTS Settings report to view the system-wide RACF
options as set or as retrieved by the SETROPTS command.
“Viewing an Access List” on page 53
Use the Access List window to view the access list for all user IDs of a resource
profile.
“Viewing an Effective Access List” on page 53
Use the Effective Access List window to view the access list for groups of users
of a resource profile that are in your scope.
“Viewing a member list” on page 54
Use the Members window to view the member list of a general resource
profile.
“Finding classes with the Select class dialog” on page 42
Use the Select class dialog to find a specific class.
If you select to work with multiple systems when you start the Visual client, the
Select Nodes dialog is displayed each time you start an action. For example, if you
select Duplicate to duplicate a user or group, the Select Nodes dialog displays
your preferred list of nodes.
Note: If you select a single node (which becomes your preferred list) to work in
multi-system mode, the Select Nodes dialog is not displayed before your request is
processed. You must select at least two nodes to view the Select Nodes dialog
before the processing of a client request.
If you have performed an action already, the nodes you selected for the previous
action are displayed. If needed, you can change the nodes to which the action
applies. You must select at least one node to continue. The local node entry is
highlighted.
If a node is defined as a zSecure node and an RRSF node, you can select only one
of these node types. If you select an RRSF node, you can use the AT or ONLYAT
options to select an alternative user ID to run the command.
For RRSF nodes, if other user IDs are associated with your user ID (using the
RACLINK command), those associated IDs are displayed.
When you click OK, the selected list of nodes is verified, then the specified action
is performed for each selected node.
Click Cancel to return to the previous dialog without selecting any nodes.
36 Client Manual
Check box column
The left check boxes enable you to select the nodes to which you want to
apply your request.
zSecure Nodes
Lists the available zSecure nodes in your preferred nodes list.
Radio button
If the row contains entries for zSecure and RRSF nodes, a radio
button is displayed beside the zSecure node. This button enables
you to select or clear the zSecure node. If you select the row and
the radio button, your request is processed for the zSecure and
RRSF nodes. If you select the row and clear the button, your
request is processed only for the RRSF node.
System_name
Displays the name of the available zSecure system. You can select
and clear the systems to which the action applies.
RRSF Nodes
Lists the available RRSF nodes in your preferred nodes list.
System_name
Displays the name of the available RRSF system. You can select
and clear the systems to which the action applies.
Alternative ID (drop-down list column)
Select this dropdown option to specify a different ID than the
associated user ID to perform the action on the selected RRSF
system. Associated IDs on RRSF systems are defined using the
RACLINK command.
Specify only IDs that are defined with the authority to execute
your action. If the specified ID does not have the authority on the
selected system to issue the command corresponding to your
action, RACF will reject the command.
The alternative user IDs that you specify are saved in the
drop-down list for your reuse during a logon session. The
alternative IDs are not saved between logon sessions.
AT Specifies how the instruction is processed at the selected RRSF
node. If you select the AT option, it is used to build the command,
for example, AT(RRSF0000.userid).
ONLYAT
Specifies how the instruction is processed at the selected RRSF
node. If you select the ONLYAT option, it is used to build the
command, for example, ONLYAT(RRSF0000.userid).
If you execute an action for multiple systems, the Status of progress form is
displayed to show the progress of the action for each selected node.
As each action completes, the progress form is updated to indicate the status of the
action on each node. For example, the Progress field indicates if the action
completes, fails, or is in progress for each node. You can click Cancel to prevent
starting the action on nodes where the action has not begun. You cannot cancel an
action in progress.
If an action fails, you can review any error messages before closing the form. Click
Close when the action completes successfully on all listed nodes.
Note: The completion status cannot be determined for RRSF nodes. Consequently,
all RRSF node requests are assumed to be successful.
Procedure
38 Client Manual
Figure 11. Find dialog
Exact The search string is the only user ID, group ID, or profile that is
loaded.
If you have site-specific fields, do not specify values in these fields if
you want to search on an exact match to the specified string in the
search field. If you select Exact and specify one or more values in the
site-specific fields, the Visual client returns message C2RU163. This
message warns that you cannot specify values in the site-specific fields
when searching for an exact match.
Filter If the search string is used as a filter, all characters of the profile key
must match. The percentage (%) character matches any character and
the asterisk (*) character matches all succeeding characters. The *
character is only accepted as a last character. For example:
v "IBMUSER" matches "IBMUSER" only.
v "I%MUSER" matches "IBMUSER," "ICMUSER," "IDMUSER" and so
on.
40 Client Manual
v "IBM*" matches "IBM," "IBMUSER," "IBMGROUP," "IBMSYS" and so
on.
The only exception is that an empty string used as a filter selects all,
just as an empty mask does.
Mask When the string is used as a mask, the first characters of the item must
match the string. "IBM" matches "IBMUSER," "IBMGROUP," "IBMSYS"
and so on.
Advanced
When clicking <<Advanced, you get additional criteria, which you can
use to reduce the selection. Only profiles that match all criteria can be
selected.
v See Chapter 4, “User management,” on page 55 for a description of
the extra fields for users.
v See Chapter 5, “Group management,” on page 85 for a description
of the extra fields for groups.
v See Chapter 7, “Resource management,” on page 109 for a
description of the extra fields for resources.
Your list of preferred nodes is maintained in the <<Advanced search
options. You can change the preferred nodes using the <<Advanced
option.
Mode selection listbox
This drop-down field is displayed only if you are operating in
multi-system mode.
Search All Nodes
Select this mode to perform operations on all preferred zSecure
nodes. You cannot include RRSF nodes in the search because
they do not return data.
Search in Selected Nodes
Default. Select this mode to perform operations on specific
zSecure nodes. Nodes are searched in the order in which they
are listed. The Search in Selected Nodes listbox is enabled
when you specify Search in Selected Nodes.
Segment
The segment option lets you refine the class you open. Select only the
profiles that have the segment you have chosen. The default option is
any, which gives you the complete profile list including the profiles that
have no segments.
If you are not authorized to view segments, or if there are no segments
present, the Segment option is shaded in gray to indicate that it is not
available.
The Find window always on top option in the Options dialog specifies
whether the dialog disappears after you click OK. The interface options
determine which fields and options are available in this dialog.
Site-specific fields
Site-specific fields with user information can be configured by your
organization. If so, one or more fields with site-specific names and
content are on the right.
View each node in a separate table
This option is displayed only if you are operating in multi-system
If you open the User or Group table and make a mistake in the Find dialog (for
example, you enter Users instead of User), the software displays the Ambiguous
Class selection "class_name" warning. If you continue the search, the program
tries to find resources of the class you type. Typically this results in the message No
matching resources found.
To view the User table, select No, then select the right class.
The Select class dialog helps you find the class you need.
42 Client Manual
Figure 15. Select class dialog
Procedure
v Click OK to select the desired class.
The table contains these columns:
Class: Name of the class.
Active:
Flag indicating whether RACF protection for the class is active.
Description:
Description of the purpose of the class.
v To limit the list of classes, use the Classes field:
All classes
Displays all classes that have been read from the class descriptor table
during logon.
Active classes
Displays only classes that are active, as set by SETROPTS CLASSACT
and SETROPTS NOCLASSACT commands on the mainframe.
Authorized classes
Displays only classes that you are authorized to change, according to
your class authorizations or system-wide special attribute.
Procedure
1. To see the connected users or groups, select a user or group.
2. Select Navigate > Connects from the main menu. You can find the explanation
of the columns of the resulting table in these topics:
v Chapter 4, “User management,” on page 55
v Chapter 5, “Group management,” on page 85
v Chapter 6, “Connect management,” on page 97
A superior group can have zero or more subgroups. A group always belongs to
only one superior group except for the group SYS1. SYS1 does not have a superior
group because it is the root of the tree.
Procedure
1. Select Navigate > Group tree from the main menu, or
2. Click the Group tree button from the toolbar.
If you are operating in multi-system mode, a Select Node dialog displays the
list of zSecure complex nodes. You can select only one zSecure complex. Select
the complex that you want to display in the group tree.
If you close and reopen the session, you must reopen the group trees for the
nonlocal nodes.
The Group tree window normally does not contain all groups defined in the
RACF database. It contains only the groups that are in your scope and their
44 Client Manual
superior groups up to SYS1. Though you can see the superior groups
displayed, you are not able to see any information about any superior group
that is out of your scope.
Load Complete is a time saving feature. It loads all groups in your scope and
their superior ones from the mainframe. It stores them in the memory of your
PC, so you can use them during this session. This loading is only possible if
your PC has enough memory capacity.
3. To select groups, enter a filter in the filter box in the grouptree window.
4. Click Find.
The grouptree is extended with the wanted groups. The first one that matches
the filter is highlighted. If you select just one group, use its name for a filter.
The Find command loads the wanted information directly from the mainframe
except when the Load Complete option is used. Then it looks into the memory
of your PC.
In the Options dialog, you can specify whether the available installation data
of the group is shown in the tree.
Procedure
Note: This procedure does not select all resources that the user has access to
because the connects of the user are not taken into account. To get a list that
takes into account the connects, use View Scope.
In addition to the columns of a resources table explained in Chapter 7,
“Resource management,” on page 109, the table contains these columns:
Using Scope
Use the various filtering options in the Scope dialog to view users, groups, and
resources that can be accessed by a specific user ID or group.
Users, groups, and resources that can be accessed by a specific user ID or group
are in scope of the user ID or group. To find the resources that every user can
select, use Scope *. See “Using Scope *” on page 50.
Procedure
46 Client Manual
Figure 19. Scope dialog
48 Client Manual
page 55, Chapter 5, “Group management,” on page 85, and Chapter 7,
“Resource management,” on page 109. The table also contains these columns:
Access
This field contains the access to the user, group, or resource. It can be
in the range Execute-Read-Update-Control-Alter and has these options:
Owner
The user or group that owns the user, group, or resource.
QualOwner
The user ID or group that is the first qualifier of a DATASET
profile.
Alter-Operations
The user that can alter the resource using their operations
attribute.
CKGOwner
Access granted by CKGRACF.
CKGList
Read access granted by CKGRACF.
Alter-M
The user can alter 'myself' - a user can alter some fields in their
own user profile.
Alter-P
Alter access on a discrete profile, enabling you to issue
PERMIT.
When If this field is not blank, the access is only granted if the condition is
met. If the field is blank, the access is granted without restriction.
Via This field contains the user ID, group, or connected group that was
granted the specified access, or it contains one of these options:
Warning
Access is granted because the profile is in warning mode.
* Access is granted because * is on the Access List with access
other than None.
UACC Access is granted because the UACC is not None or the Global
Access Table allows access.
Auditor
Access is granted because the user has a group auditor
attribute.
Operations
Access is granted because the user has a group operations
attribute.
SCP.G Access is granted because the group or the owner of the user,
group, or resource lies in the CKGRACF scope, according to a
CKG.SCP.G.... scope profile.
SCP.U Access is granted because the user or the owner of the user,
group, or resource lies in the CKGRACF scope according to a
CKG.SCP.U... scope profile.
SCP.ID
The access is granted because the user or group, or the owner
Note:
v When the Via column shows Global, the Access List and Effective Access List
options are deactivated. These lists do not yield any usable information.
v This list is a snapshot. If you want to see any changes made after you
display the list, you must close it and display it again.
A related function for resources is the effective Access List, which results in a
list of all users and groups that have access according to the profile.
Using Scope *
Use the various filtering options in the Scope * dialog to view users, groups, and
resources that can be accessed by every user.
You can use the Scope * function to view a list of resources that can be accessed by
every user. To find the users, groups, or resources that can only be accessed by a
specific user, use the Scope function. See “Using Scope” on page 46.
Procedure
1. To find the Scope * function, select Navigate > Scope * from the main menu.
50 Client Manual
UACC When selecting this option, resources that have a UACC other than
None is in scope.
ID * on Access List
When selecting this option, resources that have * on the Access List
with an access other than None are in scope.
2. Click OK to view the requested table.
The table contains columns found in resources tables, which are described in
Chapter 7, “Resource management,” on page 109. The table also contains these
columns:
Access
This field contains the access to the user, group, or resource. It can be
in the range Execute-Read-Update-Control-Alter and has these options:
Owner
The user or group that owns the user, group, or resource.
QualOwner
The user ID or group that is the first qualifier of a DATASET
profile.
Alter-Operations
The user that can alter the resource using their operations
attribute.
CKGOwner
Access granted by CKGRACF.
CKGList
Read access granted by CKGRACF.
Alter-M
The user can alter 'myself' - a user can alter some fields in their
own user profile.
Alter-P
Alter access on a discrete profile, enabling you to issue
PERMIT.
When If this field is not blank, the access is only granted if the condition is
met. If the field is blank, the access is granted without restriction.
Via This field contains the user ID, group, or connected group that was
granted the specified access, or it contains one of these options:
Warning
Access is granted because the profile is in warning mode.
* Access is granted because * is on the Access List with access
other than None.
UACC Access is granted because the UACC is not None or the Global
Access Table allows access.
Auditor
Access is granted because the user has a group auditor
attribute.
Operations
Access is granted because the user has a group operations
attribute.
Note:
v When the Via column shows Global, the Access List and Effective Access List
options are deactivated. These lists do not yield any usable information.
v This list is a snapshot. If you want to see any changes made after you
display the list, you must close it and display it again.
A related function for resources is the effective Access List, which results in a
list of all users and groups that have access according to the profile.
Procedure
To view the RACF SETROPTS Settings report, Select Navigate > System Audit >
RACF SETROPTS Settings from the main menu.
52 Client Manual
Figure 21. RACF SETROPTS Settings
Procedure
v To view the access list of a resource profile, select a resource profile then select
Navigate > Access List. The columns of the resulting table are explained in
“Modifying an Access List (ACL)” on page 118.
v To view the users in groups that are in your scope, select the Effective Access
List option. See “Viewing an Effective Access List”
The Effective Access List contains all user IDs of the access list and all users that
are in the groups on the access list. If a user is in more than one group on the
access list, the highest access is displayed, just as RACF displays the access.
To view the Effective Access List of a resource profile, follow these steps:
1. Select a resource profile from the main menu.
2. Select Navigate > Effective Access List.
“Modifying an Access List (ACL)” on page 118 explains all columns of the
resulting table except the Via column, which contains the connect group of the
user that results in the access.
Note:
v In the Options dialog, you can specify whether Group Operations or System
Operations (together with Universal Groups) are used when determining the
Effective Access List.
v When activated, the last option might cause a significant drop in
performance while creating the Effective access list.
v If a group on the access list is out of your scope, the access list displays the
group but does not display its users.
v When you load Effective Access List, the access list is loaded as well, so you
can quickly switch to the access list.
v This list is a snapshot. If you want to see any changes made after you
display the list, you must close it and display it again.
Procedure
1. To view the member list of a general resource profile, select the profile from the
main menu.
2. Select Navigate > Members. See “Viewing and changing a member list” on
page 123 for information about the columns of the resulting table.
54 Client Manual
Chapter 4. User management
In IBM Security zSecure Visual, user management tasks include viewing the user
table and properties, deleting, duplicating, and resuming users, setting passwords,
and using schedules. These tasks are described in the following topics.
“User table”
Review user data, such as owner and status, in the User table.
“Viewing user properties” on page 62
Use the User properties window to view and edit the attributes and status of
users.
“Duplicating a user” on page 66
Use the Duplicate user window to create a new user from existing users.
“Deleting a user” on page 70
Use the Delete user dialog to revoke access for one or more users.
“Resuming a user” on page 71
Use the Resume user dialog to resume a user that has revoked status. The steps
are described in this topic.
“Disabling a user” on page 71
Use the Disable user dialog to prevent a user from logging on.
“Enabling a user” on page 72
Use the Enable user dialog to enable a revoked or disabled user to log on.
“Setting passwords (or passphrases)” on page 73
Set or reset the user password or passphrase with the Set Password or Set
passphrase dialog.
“Setting a default password (or passphrase)” on page 76
Use the Edit default password or Edit default passphrase dialog to set the
default password or passphrase for a user.
“Removing the default password (or passphrase)” on page 78
Use the Edit default password or Edit default passphrase dialog to remove the
default password or passphrase for a user.
“About Schedules” on page 79
Use schedules to specify intervals during which a user is revoked or resumed.
User table
Review user data, such as owner and status, in the User table.
The User table consists of a list of users and their properties. Use the Find dialog
(see “Using the Find dialog” on page 38) to open the User table. Every icon in the
list can be either red or green. When an icon is green, it means that the user is
active; when it is red, the user is revoked or inactive.
Note: If a user ID has never been used, it does not become inactive.
Attempts
Count of logon attempts with an invalid password. This count is only kept
if the RACF user revoke setting has been activated with the RACF
SETROPTS PASSWORD(REVOKE(nn)) command on the mainframe. After
nn invalid password attempts, the user is revoked.
LastConnect
This field contains the last RACINIT date for any group that the user is
connected to.
56 Client Manual
Note: RACF uses a different date to calculate the inactivity interval of the
user.
LastPwdChange
The most recent date the password is changed.
LastPhrChange
This field displays the user's last passphrase change date.
PwdExpired
This field indicates whether the password has expired. When the password
has expired, the user must change the password at the next logon. The
field presented takes into account the current date, the password interval
of the user, the system-wide password interval, and the most recent
password change date.
PhrExpired
This field indicates whether the passphrase of the user has expired.
Interval
The period in days after which the user needs to change the password.
Owner
The owner can change the user definition.
DefaultGrp
The default group is the group that the user automatically connects at
logon.
InstData
This field has a site-defined layout and purpose. Typically it contains
organizational data on the user ID. The InstData field might be replaced
by site-specific fields, depending on the configuration used by your
organization.
Created
Date on which the user is defined.
MappingsCount
The number of distributed identity filters that are associated with the user
ID.
LegacyPwdUsed
This field indicates if the current user password is encrypted using a
legacy algorithm. A legacy algorithm can either be DES or the algorithm as
indicated by the ICHDEX01 password encryption exit (masking, DES, or
installation-defined encryption method).
LegacyPwdCount
This field indicates how many passwords in the password history are
encrypted using a legacy algorithm.
Auth Method
This field indicates the combination of authentication mechanisms to logon
to RACF that are allowed for a user:
Pwd
User can use a password.
PPhr
User can use a passphrase.
MFA
User can use the MFA mechanism.
The extra selection fields for users in the Find dialog are:
58 Client Manual
Revoke status
Select users that are revoked, not revoked, or independent of the revoke
status.
Attempts
Select users that have more or less than a certain number of password
attempts. A blank field selects users independent of the number of
password attempts.
Segment
Select the users that have the segment you specify. If this option is
disabled, you cannot view segments or there are no segments. If you select
Any, you have the complete user list, whether the profiles have segments
or not.
To manage MFA Factors, on the User table window(see Figure 22 on page 56),
select a user profile. Right click and then select MFA Factors as indicated in the
following sample:
The MFA Factors dialog then lists all the factors and their corresponding factor
tags. You can add Factors to or delete Factors from a user profile, edit Factor tags,
To add an MFA Factor to the user profile, perform the following steps:
1. On the MFA Factors dialog, click Add Factors. The Add MFA Factors window
is displayed.
To delete MFA Factors from the user profile, select the factors to be deleted on the
MFA Factors dialog and click Delete Factors.
60 Client Manual
Figure 27. Edit MFA Factor Tags window
2. To add a Factor Tag to the MFA factor, click Add Factor Tag and follow the
procedure of Add Factors as shown in MFA Factors dialog.
3. To delete Factor Tags from the MFA Factor, select the Factor Tags to be deleted
and click Delete Factor Tag.
4. To delete all Factor Tags from the MFA Factor, click Delete All Tags.
To activate a selected MFA Factor for use during logon, click Activate Factor.
To manage MFA Policies, on the User table window(see Figure 22 on page 56),
select a user profile. Right click and then select MFA Policies (see Figure 24 on
page 59). The MFA Policies dialog is then displayed, listing all the policies that are
available for a user. You can add policies to or delete policies from a user profile.
To add an MFA Policy to the user profile, perform the following steps:
1. On the MFA Policies dialog, click Add Policy. The Add policy dialog is
displayed.
2. Enter the new policy name as defined in the MFA policy profile in the
MFADEF class in 20 characters or less and click OK.
To delete a selected policy from the user's list of MFA policies, click Delete Policy.
The user property dialog presents the user properties in three categories:
Attributes, More attributes, and Status.
62 Client Manual
Procedure
1. Select Navigate > Properties from the main menu. You can also start with these
actions:
v Select and double-click the user.
v Select the user from the user table and press Enter.
v Right-click a user and select Properties from the pop-up menu.
v Click Properties on the toolbar.
Note: If more than four site-specific fields are configured, or they are
configured in addition to Installation data, those fields are shown in a panel
with the separate tab named Data.
2. View or edit the fields as needed and click OK to accept the changes.
Note: Your level of authorization determines whether you can edit the user
properties.
64 Client Manual
Class authorizations
Class in which the user is authorized to define profiles.
In the Status tab, you see these fields or buttons:
Revoked
Revoked users cannot logon, but their profiles are still present. An
administrator revokes the user, or the user is revoked automatically due
to too many unsuccessful password attempts, or by scheduled actions.
The status is derived from the revoke status flag, the current date, the
revoke date, the resume date, and the last used date.
Inactive
An inactive user that tries to logon is revoked immediately. A user ID
becomes inactive when it is not used for a period set by the SETROPTS
INACTIVE command on the mainframe. The field presented takes into
account the RACF inactive setting and the last use date.
Duplicating a user
Use the Duplicate user window to create a new user from existing users.
You can generate new users by duplicating an existing user. You can take the
existing user as the prototype user.
Note: If you are operating in multi-system mode, you can duplicate users across
zSecure nodes only; you cannot duplicate users across multiple RRSF nodes.
66 Client Manual
Figure 32. Duplicate user dialog
Procedure
Note: This action attempts to retrieve the user catalog data set
name by searching the XFACILIT class or the class configured
as the Site Module general resource class during the server
setup, as described in the IBM Security zSecure CARLa-Driven
Components: Installation and Deployment Guide. It looks for
profiles with names starting with "CKG.UCAT." using the
SHOW MYACCESS command. If one or more such profiles are
found, this option can be activated. If more than one data set
name is found, you are prompted to select one of them when
activating the option.
Do not duplicate OMVS Segment
Prevents the duplication of the OMVS Segment of the existing
user.
Set user as Protected
Sets the duplicated user as a protected user.
Segments
Use the segment fields to store information about specific subsystems
or components of z/OS. If these segments are present for the original
profile, the values are copied to the new user profile.
Some of these values must be changed while others can remain the
same. If no value exists for the duplicated user or the segment is not in
your scope, the field is disabled. For more information about
authorities needed to manage segments, see “Authorities and settings
required to manage segments” on page 127.
68 Client Manual
The fields shown in the panel are just a subset of all fields that are
present in the segments. All other fields in your scope are copied
unchanged. The segment fields are divided into two columns.
In the left column, you can find the segments that need unique values;
you must change the value for the new user profile:
KERB Kerberos name
KERB KERBNAME field that defines the local Kerberos
principal name of the user.
LNOTES Lotus® Notes® short username
LNOTES SNAME field indicating the short name as found in
the Lotus Notes address book.
NDS username
NDS UNAME field defining the user name as stored in the
Novell Directory Services for z/OS directory.
In the right column, you can find the other segment fields. These
values do not need to be unique per user profile:
OMVS UNIX user (uid)
OMVS UID field with the user identifier. To have the system
assign an unused value, use "auto." If you want more than one
user to share the UID, add "s" at the end of the UID value.
OMVS Initial program
OMVS PROGRAM field describing the path name of the first
program to be started when an OMVS session is started.
OMVS UNIX home path
OMVS HOME field defining the hierarchical file system (HFS)
or z/OS file system (zFS) directory path name of the working
directory.
DCE UUID
DCE UUID field indicating the principal name of the user as
defined in the DCE registry.
3. Click OK to start the duplication, or click Cancel to quit the dialog without
changes. The field values are validated to determine whether the unique fields
differ from the original values. If no field is changed, this warning displays and
the dialog is not closed:
Please change the <Name> field. It needs to be unique for this system.
Note: There is no check whether the value is unique in the RACF database.
Checking on this scale triggers a full database read, which can consume system
and network resources for an extended period.
4. If you are operating in multi-system mode, the Select Nodes dialog displays
your preferred list of zSecure nodes. You cannot duplicate a user across
multiple RRSF nodes. If you have performed an action already, the zSecure
nodes that you selected previously are displayed. Complete these steps if you
are using multi-system mode:
a. Specify the nodes to which the action applies. You must select at least one
node to continue. The local node entry is highlighted.
b. Click OK to verify the selected list of nodes. The action is performed for
each selected node.
You cannot delete users from the RACF database if you are using zSecure Visual.
However, you can revoke their access by marking them for deletion. You can
revoke access for one or more selected users.
Procedure
1. Select a user ID and click Action > Delete in the main menu. You can also
revoke user access using these actions:
v Right-click a user ID to display the pop-up menu and select Delete.
v Select a user ID and click Delete from the toolbar.
v Drop the users on the Recycle Bin.
2. Enter a reason for the deletion. This reason is displayed if you undo a Delete.
3. Click OK, or click Cancel to quit the dialog to discard any changes. The
selected user IDs are disabled in the $DELETE schedules of the users.
If you are using multi-system mode, the Select Nodes dialog displays your
preferred list of nodes. If you have performed an action already, the nodes that
you selected previously are displayed. Complete these steps if you are using
multi-system mode:
a. Specify the nodes to which the action applies. You must select at least one
node to continue. The local node entry is highlighted.
b. If a node is defined as a zSecure node and an RRSF node, select only one of
these node types. If you select an RRSF node, you can use the AT or
ONLYAT options to select from the drop-down list an alternative user ID to
run the command.
c. Click OK to verify the selected list of nodes. The action is performed for
each selected node.
70 Client Manual
Results
To undo Delete, go to the schedules of the user and delete the disabled action in
the $DELETE schedule. If there are no other scheduled actions, you must also
resume the user. A related dialog is displayed in that case.
Resuming a user
Use the Resume user dialog to resume a user that has revoked status. The steps
are described in this topic.
A resume resets the revoke status of the user. It succeeds only if the revoke is not
due to scheduled actions. In that case, you must delete the scheduled action.
Procedure
1. Select the user IDs and click Action > Resume from the main menu. You can
also use these actions:
v Right-click the user IDs to display the pop-up menu and select Resume.
v Select the user IDs and click Resume on the toolbar.
The Resume user userid userid dialog is displayed for one of the users you
selected:
Disabling a user
Use the Disable user dialog to prevent a user from logging on.
Procedure
1. Select a user ID from the main menu.
2. Select Action > Disable, or right-click a user ID and select Disable from the
pop-up menu:
If you are operating in multi-system mode, the node associated with the user is
displayed in the header of the dialog.
3. Enter the reason for disabling the user. If the user is already disabled, the
reason can be shown in the Details field.
4. Click OK to finish.
Enabling a user
Use the Enable user dialog to enable a revoked or disabled user to log on.
You can enable a revoked or disabled user to log on again. When enabling a user,
any schedule that disables the user expires. If there is more than one schedule
available to enable the user, you can select any one of them from the selection list.
Procedure
1. Select a user ID and select Action > Enable from the main menu, or right-click
a user ID and select Enable from the pop-up menu:
72 Client Manual
Figure 36. Enable user dialog
If you are operating in multi-system mode, the node associated with the user is
displayed in the header of the dialog.
2. Enter the reason for enabling the user. If a future schedule disables the user
again, the reason can be shown in the Details field. If no schedules exist to
disable the user, a dialog is displayed to do a normal resume.
Note: The Enable user dialog is displayed even if you do not have the
authority to resume.
3. If the user is marked for deletion, confirm the enabling action. Once confirmed,
the user is no longer marked for deletion. If the user is disabled with one or
more schedules that are out of your scope, an error message is displayed that
lists the out-of-scope schedules.
4. Click OK to finish.
5. To enable users on multiple systems, select each user individually in the list of
users, then repeat these steps.
The procedure for setting a passphrase is very similar to the procedure for setting
a password. Therefore, to set a passphrase, follow the procedures for setting a
password in this section, but use the Set passphrase dialog instead of the Set
password dialog:
Procedure
74 Client Manual
Figure 38. Set password dialog
If you are operating in multi-system mode, the complex and node associated
with the user is displayed in the header of the dialog.
The available options and checkboxes depend on your update access level. If
your client display is set to Gray desired unauthorized functions, you can
view the unavailable options. If your client display is set to Hide desired
unauthorized functions, you see only the available options and checkboxes.
See “Setting interface options according to your access level” on page 27. The
next step describes all possible options and checkboxes.
2. Complete the appropriate fields in the dialog.
Reset Password
Sets the password to the default password and sets the password to
"expired."
Previous password
Sets the password back to the previous value. This setting works only if
a password history is maintained in RACF and the user remembers the
previous password.
Default password
Sets the password to the default password that the administrator set
previously.
New password
Sets the password to a new value. You must confirm the new value by
retyping it in the Confirm new password field. This value must be
compliant with the password rules. It must not occur in the password
history unless you have the necessary access to the corresponding
resources to bypass these checks. See IBM Security zSecure
CARLa-Driven Components: Installation and Deployment Guide for more
information about specifying passwords.
The procedure for setting a default passphrase is very similar to the procedure for
setting a default password. Therefore, to set a default passphrase, follow the
procedures for setting a default password in this section, but use the Edit default
passphrase dialog instead of the Edit default password dialog:
76 Client Manual
Figure 39. Edit default passphrase dialog
The default password (or passphrase) is a fixed value that the user can set. By
default, the default password (or passphrase) is set system-wide. It is outside the
scope of zSecure Visual. However, it is more secure to set an individual default
password (or passphrase) for each user, especially for users with important roles.
78 Client Manual
About this task
Removing or changing the default password (or passphrase) does not affect the
normal password (or passphrase). The normal password (or passphrase) changes to
the default password (or passphrase) only if it is reset to it. If you change the
default password (or passphrase) after resetting, it does not affect the normal
password (or passphrase); it retains the old default value.
The procedure for removing a passphrase is very similar to the procedure for
removing a password. Therefore, to remove a passphrase, follow the procedures
for removing a password in this section, but use the Edit default passphrase dialog
instead of the Edit default password dialog:
Procedure
You can remove the default password using these steps:
1. Select a user ID and select Navigate > Properties from the main menu to open
the properties dialog.
2. Select the Status tab.
3. Click Edit Default Password to open the Edit Default Password dialog.
4. Select the Remove Default Password box.
5. Optionally, enter the reason why the default password is removed.
6. Click OK. When a default password is set, the Edit default password dialog
displays this information:
v The user ID of the person who changed the password
v The date and time of the change
About Schedules
Use schedules to specify intervals during which a user is revoked or resumed.
The only way to revoke a user in zSecure Visual is to use schedules. Schedules are
a facility provided by the CKGRACF mainframe program that enables different
groups of administrators to set the revoke status of a user.
You can separately revoke and resume a user, or you can combine these two
actions. These are called intervals. The CKGRACF program updates the revoke
flags of the user based on the schedules. A disabling interval starts with a revoke
and ends with a resume. An enabling interval starts with a resume and ends with
a revoke. A single revoke or resume corresponds with an interval without an end
date. All actions of an interval are written to the RACF database, together with the
schedule name, date, author, and reason. The schedule name is categorize intervals.
New intervals wipe previous conflicting actions only in the same schedule. When
all past scheduled actions are deleted, CKGRACF leaves the user's revoke status
unchanged.
The equivalent of revoking a user is Disable from today forever. The equivalent of
deleting a user is Disable from today forever with schedule name $DELETE. The
deletion is sent to the mainframe after you click OK in the schedules dialog.
Users are only able to log on when all scheduled actions enable them to. Schedules
can be set by centralized and decentralized administrators. When given access to
Procedure
v To view the schedules of a user, perform one of these steps:
1. Select the user and select Navigate > Schedules from the main menu.
2. Right-click the user to display the pop-up menu and select Schedules.
3. Select the user and click Schedules on the toolbar.
80 Client Manual
Adding a schedule interval
Use the Add schedule dialog to add a new schedule that enables or disables a
user.
Procedure
2. Enter the fields and click OK to add the schedule to the table. The new
schedule interval becomes active after clicking OK in the Schedules dialog.
The dialog contains these fields:
Name Name of the schedule. You can select one of the predefined names or
type a new name.
Type Select Disable to disable the user for a certain period, select Enable to
enable the user.
Start Enter the start date of the interval. The start date is included in the
interval.
End Either enter an end date, or select Forever to indicate there is no end
date for this interval. The end date is included in the interval.
Reason
Enter a reason for the enabling or disabling the user.
You cannot edit an existing schedule, but with the Repeat function, you can make
a new schedule based on the existing one. If the existing schedule and the new
schedule overlap, the program creates a new schedule. The new schedule begins at
the earliest start date and ends at the last termination date.
To create a new schedule using the existing schedule, select Navigate > Schedules
> Repeat from the main menu.
Mappings
Use mapping profiles to determine the distributed identity filters associated with
RACF user IDs.
RACF supports distributed identity filters which are mapping associations between
a RACF user ID and one or more distributed user identities, as they are known to
Web-based application servers and defined in distributed user registries. The
Mappings window provides the information about distributed identity filters
associated with the RACF user ID. These filters are in fact the IDIDMAP profiles.
For the remainder of this chapter, such profiles are referred as mapping profiles.
Viewing mappings
Use the various Mappings selections to view information about the mapping
profile of a user.
Procedure
To view mapping information of a user, perform one of these steps:
v Select the user and select Navigate > Mappings from the main menu.
v Right-click the user to display the pop-up menu and select Mappings.
v Click the Mappings button on the User Properties dialog.
82 Client Manual
Figure 45. Mapping information for a user
Group table
You can review group data, such as owner and connected users, in the Groups
table.
Use the Find dialog to view a list of groups. A group is displayed in two colors,
blue as default and gray when the installation data of the group is not yet loaded.
Note:
1. A group can be created as a universal group. It is not possible to
change the attribute after creation.
2. In most cases, it is not possible to delete a universal group.
3. The old limitation of 5957 connections is still valid for users with
authority higher than USE or with the attributes SPECIAL,
OPERATIONS, or AUDITOR at the group level.
4. For universal groups, the Connected Users table shows only the users
with authority higher than USE or with the attributes SPECIAL,
OPERATIONS, or AUDITOR at the group level.
5. On sites where universal groups are not yet supported, the Universal
column or field stays empty and disabled.
Users Number of users connected to the group.
Created
Date of creation of the group.
The extra selection fields for groups in the Find dialog are:
86 Client Manual
Figure 47. Find dialog for groups
Installation data
A substring that appears in the installation data.
Owner
Select groups by owner. The field is used as a filter.
Users Select groups that have more or less than a certain number of connected
users. A blank in the number field selects groups independently of this
number. Typing < or > in the number field selects the corresponding
operator.
Segment
Select the groups that have the segment you specified. If this option is
disabled, you cannot view segments or there are no segments. The option
ANY gives you the complete group list, whether the profiles have
segments or not.
The Group properties dialog provides detailed information about a specific group.
Procedure
1. Select a group and select Navigate > Properties from the main menu.
88 Client Manual
Note:
a. A group can be created as universal group. It is not possible to
change the attribute after creation.
b. In most cases, it is not possible to delete a universal group.
c. The old limitation of 5957 connections is still valid for users with
authority higher than USE or with the attributes SPECIAL,
OPERATIONS, or AUDITOR at the group level.
d. For universal groups, the Connected Users table shows only the
users with authority higher than USE or with the attributes
SPECIAL, OPERATIONS, or AUDITOR at the group level.
e. On sites where universal groups are not yet supported, the
Universal column or field stays empty and disabled.
Created
Date of creation of the group.
Installation data
The purpose and layout of this field are defined by your organization.
You can change the contents of this field.
Adding a subgroup
Use the Add subgroup dialog to add a new subgroup to a group.
Procedure
90 Client Manual
Define Alias
Optional. Defines an alias for the group pointing to the user
catalog. You must know the user catalog data set name to use
this option. This command is also available on the Action
menu. This action attempts to retrieve the user catalog data set
name by searching the XFACILIT class, or the class configured
as the Site Module general resource class during the server
setup, as described in the IBM Security zSecure CARLa-Driven
Components: Installation and Deployment Guide. It looks for
profiles with names starting with "CKG.UCAT." using the
SHOW MYACCESS command. If one or more such profiles are
found, this option can be activated. If more than one data set
name is found, you are prompted to select one of them when
activating the option.
Duplicating a group
Use the Duplicate group window to create a new group from an existing group.
Note: If you are operating in multi-system mode, you can duplicate groups across
zSecure nodes only; you cannot duplicate groups across multiple RRSF nodes.
Procedure
92 Client Manual
New group
Group Required. Change the name from the copied name to a new
name.
Installation Data
Required. The data shown is copied from the group you are
using to create the new group. You can change the copied data
to new data.
Additional Actions
Enforce creation of data set profile
Optional. Creates a generic data set profile with the new group
name as High Level Qualifier or HLQ. It has the new group as
owner and a UACC of none. This command is also available on
the Action menu.
Define Alias
Optional. Defines an alias for the group pointing to the user
catalog. You must know the user catalog data set name to use
this option. This command is also available on the Action
menu.
Note: This action attempts to retrieve the user catalog data set
name by searching the XFACILIT class, or the class configured
as the Site Module general resource class during the server
setup, as described in the IBM Security zSecure CARLa-Driven
Components: Installation and Deployment Guide. It looks for
profiles with names starting with "CKG.UCAT." using the
SHOW MYACCESS command. If one or more such profiles are
found, this option can be activated. If more than one data set
name is found, you are prompted to select one of them when
activating the option.
Do not duplicate OMVS Segment
Prevents the duplication of the OMVS Segment of the existing
group.
Segment
If the segment is present in the original group profile, the value is
copied to the new group and displayed in this field. If no segment
value exists for the duplicated group or if the segment is not in your
scope, this field is disabled. If this field is disabled, you cannot create
this segment for the new group in this dialog. For more information
about the authorities needed to manage segments, see “Authorities and
settings required to manage segments” on page 127.
OMVS z/OS UNIX group (grpid)
The z/OS UNIX group identifier. To have the system assign an
unused value, use "auto." If you want more than one group to
share the group ID, add "s" at the end of the grpid value.
3. Click OK to create the duplicate group, or click Cancel to cancel the changes.
4. If you are operating in multi-system mode, the Select Nodes dialog displays
your preferred list of nodes. If you have performed an action already, the
zSecure nodes that you selected previously are displayed.
Complete the following steps if you are using multi-system mode.
Deleting a group
Use the Delete group dialog to delete a group or to prevent users from using the
group (incomplete deletion).
You can delete a group only if the group does not own resources. If the group
owns resources, the group remains present. However, because all permits and
connects have been removed, no user can use the group. A dialog is displayed to
inform you about the incomplete deletion.
Procedure
Follow these steps to delete a group:
1. Select the group and click Action > Delete in the main menu. You can also use
these actions:
v Select the group and press the Delete key.
v Right-click a group to display the pop-up menu and select Delete.
v Select the group and click Delete from the toolbar.
The dialog lists the Group, SupGroup, and Installation Data of the group to be
deleted. If you are operating in multi-system mode, the associated complex and
node names are listed at the top of the dialog.
2. Click OK to delete the group, or click Cancel to quit the dialog without making
changes.
3. If you are using multi-system mode, the Select Nodes dialog displays your
preferred list of nodes. If you have performed an action already, the nodes that
you selected previously are displayed.
Complete these steps if you are using multi-system mode:
a. Specify the nodes to which the action applies. You must select at least one
node to continue. The local node entry is highlighted.
94 Client Manual
b. If a node is defined as a zSecure node and an RRSF node, select only one of
these node types. If you select an RRSF node, you can use the AT or
ONLYAT options to select from the drop-down list an alternative user ID to
run the command.
c. Click OK to verify the selected list of nodes. The action is performed for
each selected node.
RACF users are connected to one or more groups. Different kinds of connects
result in different authorizations for the users. Users get at least some of the
authorizations of their groups. Their authorizations depend on the attributes of the
connect, but they can use the resources that their groups have access to.
Connection relationships between users and groups are described in the following
topics.
“Connects table”
Review connects and access levels for a user or group in the Connects table.
“Connects in multi-system mode” on page 98
Follow these guidelines to create and change connects for users and groups in
multi-system mode.
“Viewing and changing Connect properties” on page 99
Use the Properties dialogs for users and groups to view or change the
properties of a connect.
“Creating a connect” on page 102
To view or change the properties of a connect, use the Properties dialogs for
users and groups.
“Deleting a connect” on page 104
Use the Delete connect dialog to delete the connects of a user and a group.
“Copy, merge, and move functions for connects” on page 106
Use the Drag and Drop and Copy and Paste functions to copy, merge, and
move connects.
Connects table
Review connects and access levels for a user or group in the Connects table.
The Connects table displays the connects of a user or group. Use these methods to
open the connects table:
v Select a user or group and select Navigate > Connects from the main menu.
v Right-click a user or group and select Connects from the pop-up menu.
v Select a user or group and click Connect on the toolbar.
Note: For universal groups, the Connected Users table shows only the users with
authority higher than USE or with the SPECIAL, OPERATIONS, or AUDITOR
attributes at the group level.
For users, the other columns are the same as the user table in “User table” on page
55, except the revoked column. The revoked column indicates the users whose
connection to the group is revoked.
Complex
The name of the zSecure node where the result was found. This column is
displayed only if you are operating in multi-system mode.
Auth Connect authority. The value can be any of these options:
Use The user can access the resources that the group has access to.
Create The user has the same authorizations as with Use. The user is also
authorized to create data sets and data set profiles that have a
High-Level-Qualifier (HLQ) as the name of the group.
Connect
The user has the same authorizations as with Create and is also
authorized to connect existing users to the group.
Join The user has the same authorizations as with Connect and is also
authorized to create new subgroups.
gSpec Group special attribute. When a user is connected with the group special
attribute, the user can do everything with users, groups, and resources that
are in the scope of the group, except changing auditing attributes.
gOper Group operations attribute. When a user is connected to a group with the
group operations attribute, the user can do everything with resources that
are in the scope of the group.
gAud Group auditor attribute. When a user is connected to a group with the
group auditor attribute, the user can change auditing attributes of the
users, groups, and resources that are in the scope of the group.
You can connect users and groups only on the same node. You cannot connect
users and groups across separate nodes. However, if the same-name groups and
users exist in another node, you can propagate the connects to that node.
Note: Use caution if you intend to propagate connects across nodes. You can create
unintended consequences if the names and groups are not identical.
If you have two users with different names but identical user IDs on separate
nodes, you can unintentionally propagate a user's connect properties to a different
user. The Visual client does not ensure that user IDs refer to the same user or
group names.
98 Client Manual
Viewing and changing Connect properties
Use the Properties dialogs for users and groups to view or change the properties
of a connect.
Procedure
1. To see the properties of the connected users of a group, perform one of these
steps:
v Select the users and select Navigate > Show Connects from the main menu.
v Right-click the users and select Show Connects from the pop-up menu.
v Click Show Connects on the toolbar.
If you want to see the connects between a group and its users, the columns of
the resulting table are described in Chapter 4, “User management,” on page 55.
If you want to see the connects between the groups of a user, the columns of
the resulting table are described in Chapter 5, “Group management,” on page
85.
2. To see or change the properties of a connect, perform one of these steps:
v Select the connected user or group and select Navigate > Properties from the
main menu.
v Right-click a connected user or group and select Properties from the pop-up
menu.
v Click Properties on the toolbar.
The resulting dialog depends on whether you select to view properties for a
user or group.
3. If you select to view properties for a group, the following dialog is displayed:
The complex and node names are displayed in the header of the dialog only if
you are operating in multi-system mode.
The Properties dialog for a group has two tabs: Connect and Group. Your
authorization to create connects on the mainframe determines which of these
fields are editable.
The Connect tab for group properties displays these fields:
The complex and node names are displayed in the header of the dialog only if
you are operating in multi-system mode.
The Properties dialog for a user has four tabs: Connect, Attributes, More
Attributes, and Status. Your authorization to create connects on the mainframe
determines which of the fields on these tabs are editable.
The Connect tab for user properties displays these fields.
Group The connected group of the selected user.
Owner
The user or group that owns the user.
Authority
Connect authority. From the connect authority dropdown list, you can
select either Use, Connect, Create or Join.
Use The user can access the resources that the group has access to.
Create The user has the same authorizations as with Use. The user is
also authorized to create data sets and data set profiles that
have a High-Level-Qualifier (HLQ) as the name of the group.
Connect
The user has the same authorizations as with Create and is also
authorized to connect existing users to the group.
Join The user has the same authorizations as with Connect and is
also authorized to create new subgroups.
gSpec Group special attribute. When a user is connected to a group with the
group special attribute, the user can do everything with users, groups,
and resources that are in the scope of the group, except changing
auditing attributes.
gOper Group operations attribute. When a user is connected to a group with
the group operations attribute, the user can do everything with
resources that are in the scope of the group.
gAud Group auditor attribute. When a user is connected to a group with the
Creating a connect
To view or change the properties of a connect, use the Properties dialogs for users
and groups.
A connect is a relation between a user and a group. The kind of the relation
between a user and a group depends on its attributes.
Procedure
1. To create a connect, select either users or groups and perform one of these
steps:
v Select Action > Connect from the main menu.
v Right-click a user or group and select Connect from the pop-up menu.
v Click Connect on the toolbar.
The complex and node names are displayed in the header of the dialog only if
you are operating in multi-system mode.
2. Enter the user ID or group. You can select from these options:
Authority
Connect authority. The connect authority is either Use, Connect, Create,
or Join.
Use The user can access the resources that the group has access to.
Create The user has the same authorizations as with Use. The user is
also authorized to create data sets and data set profiles that
have a High-Level-Qualifier (HLQ) as the name of the group.
Connect
The user has the same authorizations as with Create and is also
authorized to connect existing users to the group.
Join The user has the same authorizations as with Connect and is
also authorized to create new subgroups.
gSpec Group special attribute. When a user is connected to a group with the
group special attribute, the user can do everything with users, groups,
and resources that are in the scope of the group, except changing
auditing attributes.
gOper Group operations attribute. When a user is connected to a group with
the group operations attribute, the user can do everything with
resources that are in the scope of the group.
gAud Group auditor attribute. When a user is connected to a group with the
group auditor attribute, the user can change auditing attributes of the
users, groups, and resources that are in the scope of the group.
Resume Date
Specifies the date that the connection to the group is resumed for the
user ID in the Userid field. If the RESUME attribute is required, the
check box is selected and the calendar (date selector) is enabled. Use
the calendar to specify the date.
Note: You can create a connect for users and groups only on the same node.
You cannot create a connect for users and groups across separate nodes.
However, if the same-name groups and users exist in another node, selecting
multiple systems will propagate the new connect to the specified nodes. Use
caution if you intend to propagate new connects across nodes. See “Connects in
multi-system mode” on page 98.
If a node is defined as a zSecure node and an RRSF node, you can select only
one of these node types. If you select an RRSF node, you can use the AT or
ONLYAT options to select from the dropdown list an alternative user ID to run
the command.
a. Click OK. The selected list of nodes is verified, then the create-connect
action is performed for each selected node.
5. Click Cancel to return to the previous dialog without selecting any nodes.
You can also use the Copy-Paste function available on the main menu bar. This
function copies all the attributes. For more information, see “Copy and paste
function” on page 30.
Deleting a connect
Use the Delete connect dialog to delete the connects of a user and a group.
2. Specify that the user must be removed from all access lists of group resources
in the Remove user permits from group resources option.
3. Click OK to delete or remove the connect.
4. If you are operating in multi-system mode, the Select Nodes dialog displays
your preferred list of nodes. If you have performed an action already, the nodes
that you selected previously are displayed.
a. Select the nodes to which the delete-connect action applies. You must select
at least one node to continue. Note that the local node entry is highlighted.
Note: You can delete a connect for users and groups only on the same
node. You cannot delete a connect for users and groups across separate
nodes. However, if the same-name groups and users exist in another node,
selecting multiple systems will propagate the delete-connect action to the
specified nodes. Use caution if you intend to propagate the delete connects
action across nodes. See “Connects in multi-system mode” on page 98.
If a node is defined as a zSecure node and an RRSF node, you can select
only one of these node types. If you select an RRSF node, you can use the
AT or ONLYAT options to select from the dropdown list an alternative user
ID to run the command.
b. Click OK. The selected list of nodes is verified, then the delete-connect
action is performed for each selected node.
c. Click Cancel to return to the previous dialog without selecting any nodes.
You can copy, merge, and move connects by using Drag and Drop or Copy and
Paste. If you use Drag and Drop, you can drag connects from one table and drop
them on a similar one. After the drop, a pop-up menu is displayed, listing these
options:
Copy The dragged connects are copied to the target table. If a connect exists and
has an authority higher than the dragged connect, the user can choose
between copying and merging the connects. If copy is selected, the
dragged connects replace the target connects. If merge is selected instead,
every new connect has the attributes of both connects and have the highest
connect authority.
Note: When copying a connect, if the revoke or resume dates are earlier
than or equal to the current date, RACF prevents you from copying or
entering the dates. Table 5 shows how revoke and resume values are
managed for copy-connect actions.
Table 5. Before-and-after revoke-and-resume values for copy-connect operation
Original Values Copy Output Values
Revoke Revoke Date Resume Date Revoke New Revoke New Resume
Flag Flag Date Date
None None None None
GT today None *Copy revoke None
date
GT today GT revoke *Copy revoke Copy resume
date date date
LT today LE today & (1)None None
GT revoke
date
Yes LE today None **Yes (2)None None
LT today Today None None
Yes LE today GT today **Yes (3)None Copy resume
date
Yes None None **Yes None None
None LT today None None
None Today None None
Yes None GT today **Yes None Copy resume
date
Legend: LT = less than, LE = less than or equal to, GT = greater than, None = not specified
*For a temporary connect, you must remove the revoke date in order for the copy
operation to create a permanent connect.
**If the revoke flag is set in the copied values, the initial status of the connect is set to
revoked.
(1)The resume date takes precedence because it is less than or equal to today's date. The
new connection is not set to revoke and resume.
(2)The connection is already revoked (date in the past), therefore the new connection is set
to be revoked with no revoke or resume dates.
(3)The connection has a current status of revoked (date in the past), but a resume date later
than today is specified. The new connection is revoked and set to resume with the
specified date.
Select Copy and Paste from the main menu to perform a copy and paste operation.
For more information about Copy and Paste, see “Copy and paste function” on
page 30.
Access checks are done against specific resource classes, depending on the type of
resource the access check is for. For example, DATASET for reading a data set, or
TERMINAL to see if you can log on using a particular machine. Profiles within
each class describe sets of access settings. The profile name can be generic, like a
mask specification. RACF determines which access settings apply by looking for
the profile name that best matches the resource name within the particular class.
In RACF, a distinction is made between DATASET profiles and all other resource
profiles. The DATASET profiles reside in the DATASET class which controls access
to data sets. All other resource profiles are called General Resource Profiles. zSecure
Visual lets you work with both types of profiles.
To protect a resource with a profile, the profile has to reside in the appropriate
class. The name of the profile needs to match the name of the resource. For
example, to protect dataset CKR.CKR230.SCKRLOAD, you can make a profile
named CKR.CKR230.SCKRLOAD in the DATASET class.
To avoid creating a resource profile for every resource, RACF enables you to use
generic characters in the profile name. You can use character * to represent one
qualifier, or the rest of the current qualifier. The ** sequence matches zero or more
qualifiers. The following examples show the matches based on the use of the *
character:
CKR.CKR*.SCKRLOAD matches CKR.CKR230.SCKRLOAD.
CKR.CKR230.SCKRLOAD.* does not match CKR.CKR230.SCKRLOAD,
because it has no fourth qualifier.
CKR.** matches CKR.CKR230.SCKRLOAD.
CKR.**.SCKRLOAD matches CKR.CKR230.SCKRLOAD.
If there are different resource profiles that match a certain resource, RACF uses the
most specific profile. It is the one with the most characters left of the first generic
character.
Resource table
You can review resource profile contents in the Resources table.
Typically a profile contains an access list that specifies the access to the resources,
which users and groups have, covered by the profile. Some general resource
classes grant access by a different procedure.
Use the Find dialog to locate a list of all resources. You can use * in the class to get
profiles of different resource classes in one table. If you leave the class field empty,
you can get all resources but without users or groups.
The extra selection fields for resources in the Find dialog are:
Installation data
Select only resources that have the specified pattern in their installation
data.
Owner
Select only resources whose owner matches the specified filter.
Segment
Select the resources that have the segment you specified. If this option is
disabled, you cannot view segments or there are none. The option any
gives you the complete resource list, whether the profiles have segments or
not.
Procedure
For the IDIDMAP profiles, you can view their associated mapping information by
following these steps:
1. Select the IDIDMAP profile from the main menu.
2. Select Navigate > Mappings. Alternatively, you can right-click the IDIDMAP
profile to display the pop-up menu and select Mappings.
Note: You cannot duplicate, add, edit, or delete an IDIDMAP profile. For more
information, see “Viewing mappings” on page 82.
You can create a new resource profile through the resource table.
Note: You can only create generic DATASET profiles, including fully qualified
generics.
Procedure
3. Enter the profile data. The fields and options are described here:
Complex: Node
The complex and node names to which this action applies are
displayed in the header of the dialog only if you are operating in
multi-system mode.
Note: You cannot copy a resource profile from a DATASET class to a general
resource class or vice versa.
Procedure
2. If you are duplicating the profile to create a new profile for a single node,
change the data in the fields. For descriptions of the fields, see “Adding a
resource profile” on page 113.
3. If you need the new profile to take effect immediately for all users, click
Refresh to refresh the class. If you do not refresh the class, the profile becomes
active only for those users that do not have it cached.
4. Click OK to create the profile. If you are duplicating the profile for another
node, select the nodes to which the profile applies, then click OK.
The name access list is often abbreviated as ACL. A resource profile typically has
an access list, which is a list of user IDs and group IDs, their granted access and,
optionally, a condition.
Procedure
1. To view the access list of a resource profile, select the profile and click Navigate
> Access List in the main menu.
When a group is placed on the access list, all its users get access, see “Viewing
an Effective Access List” on page 53. The user and group columns are
described in Chapter 2, “IBM Security zSecure Visual customization and
primary tasks,” on page 17 and Chapter 4, “User management,” on page 55.
The following columns are also in the access list table:
Node The name of the node that is associated with the ID.
ID User ID or group.
Access
Granted access. It is always one of these options:
None All means of access is denied for the specified user or group.
Execute
The specified user or group can execute the resource. It is only
effective for data sets and programs.
Read The specified user or group can execute and read the resource.
Update
The specified user or group can execute, read, and update or
write the resource.
Control
The specified user or group can execute, read, update or write,
and create or remove the resource.
Alter The specified user or group can do anything with the resource
and change the resource profile, just as the owner.
When A blank field means there is no condition, so the access is granted
without restriction. Entries in this field have this form:
APPCPort appcport Console console JESInput class Program
program SYSID id Terminal terminal
2. Complete these steps to add, delete, or change ID entries in the list and process
your changes:
a. Select a list entry (ID).
b. Click Add, Edit, or Delete, to change the list entry. A dialog for the selected
task is displayed:
v “Adding a user or group to an access list” on page 120
v “Editing an access list entry” on page 121
Note: Your changes do not become effective for users whose affected profiles
are cached until you refresh the class.
4. Click OK to apply your changes to the access list to the mainframe.
5. If you are operating in multi-system mode, the Select Nodes dialog displays
your preferred list of nodes. Complete these steps if you are using multi-system
mode:
a. Specify the nodes to which the changes applies. You must select at least one
node to continue. Note that the local node entry is highlighted.
b. If a node is defined as a zSecure node and an RRSF node, select only one of
these node types. If you select an RRSF node, you can use the AT or
ONLYAT options to select from the dropdown list an alternative user ID to
run the command.
c. Click OK to verify the selected list of nodes. The IDs of the current node, if
selected, are updated with your changes. Your changes to the current node
are then replicated to the other selected nodes.
Note:
v You must understand the differences in the ID data across your RACF
databases; other nodes might not have the same initial access list as the
current node.
v IDs that are different than the current node remain in the other nodes.
v The client does not verify that the user or group IDs exist in the other
nodes. If an ID does not exist in the target database, it is rejected by
RACF as an error and ignored.
Procedure
Procedure
To edit the entry of a user or group in the access list, follow these steps:
1. Select the entry and click Edit in the table window.
Procedure
Profile members
The administrator uses these guidelines to plan and implement the use of grouping
classes.
All resource profiles except DATASET profiles can have a member list. In practice,
only some classes have profiles with members. The typical way to use profile
members is to access on groups of resources instead of individual resources. You
need a member and grouping class.
Member and grouping classes are linked together in the Class Descriptor Table.
The member class can contain profiles that accept access the normal way. The
grouping class is grant access for groups of resources. A group is represented by a
profile in the class. This grouping profile can have a list of members, each of which
contains a resource name. Any rights granted on the grouping profile accepts
access on all the resources named in the members.
Attention: The design of the group structure is important. For ease of use, a
group name must give a good indication of either the contents or the use of the
resource group. Avoid this usage:
v Use of both the member and grouping class simultaneously for the same
resource.
v Recurrence of the same resource in more than one group, if you plan to grant
access on those resource groups to a user or group.
The various issues involved when merging access rights for multiple resources are
complex and can result in unexpected and undesired effects. Also, no clear report
of the result is available.
If you carefully plan and implement your groupings, granting rights on the
resource groups is simpler and less error-prone than granting rights on individual
transactions.
Exceptions
The administrator must be aware of these exceptional grouping classes, which
need special consideration.
In some classes profile members are used in different ways than previously
described. Explaining the mechanisms involved is beyond the scope of this
manual. Some of the better known exceptions are:
v The Global Access Table (GLOBAL class, DATASET profile)
v NODES class
v PROGRAM class
v RACFVARS class
Procedure
To display the member list of a resource profile and change the list, perform these
steps:
1. Select the profile and select Navigate > Members from the main menu.
Adding a member
Use the Add member dialog to add a new member to a member list of a resource
profile.
Procedure
Note: When adding a member to the PROGRAM class, use the DSN, Volume,
and PADCHK fields to construct the new member string.
3. Click OK to add the new member to the list. The changes do not become
effective for users whose affected profiles are cached until you refresh the class
in the main member list.
Editing a member
Use the Edit member dialog to change a member of a list.
Procedure
Note: When editing a member in the PROGRAM class, use the DSN, Volume,
and PADCHK fields to construct the member string.
3. Click OK to apply the changes to the member list. The changes do not become
effective for users whose affected profiles are cached until you refresh the class
in the main member list.
Deleting a member
Use the Delete function to delete a member from a list.
Procedure
Refreshing a class
Use the Refresh function to refresh a class after changing resource profiles in the
RACF database.
Procedure
To view segments, you must set the Interface level option at administration level
Full. To select this level, go to View > Options on the main menu.
IBM Security zSecure Visual enables you to view and edit segments. The
Segmenttypes table displays an overview of all segments that zSecure Visual can
show.
Note: This number is not initially specified. Each time you view
information about a segment, the relevant number of that segment is
updated in the Segmenttypes list.
2. To view information about segments, right-click a row and select Segment List.
See “Viewing the segment list” on page 130.
Application segments
The administrator uses this table to determine which segments are associated with
the user, group, and resource profiles.
The following table lists the segments of resource profiles in their related classes.
Class Segment
APPCLU SESSION
CDT CDTINFO
CFIELD CFDEF
CSFKEYS ICSF
DATASET DFP
DATASET TME
DIGTCERT CERTDATA
DIGTRING CERTDATA
DLFCLASS DLFDATA
EJBROLE TME
FACILITY DLFDATA
FACILITY EIM
FACILITY PROXY
FACILITY TME
GCSFKEYS ICSF
GXCSFKEY ICSF
LDAPBIND EIM
LDAPBIND ICTX
LDAPBIND PROXY
MFADEF MFPOLICY
PROGRAM SIGVER
PTKTDATA SSIGNON
REALM KERB
ROLE TME
STARTED STDATA
SYSMVIEW SVFMR
XCSFKEY ICSF
Procedure
The segment list always starts with the name of the profile. The other fields are
segment specific. The names are abbreviations. You can find the complete
names in the segment detail window. For more information about the segment
fields, see “Segment fields” on page 134.
4. If you select a profile in the segment list, you have these possibilities:
v View the properties of the profile by performing one of these steps:
– Select Navigate > Properties on the main menu and double-click the
profile; or,
– Right-click the profile and select the option Properties.
v View the segment detail window of the profile by performing one of these
steps:
– Select Navigate > Segments from the main menu; or,
– Right-click the profile and select the option Segments.
v Add a segment to a profile. For more information, see “Adding a segment”
on page 132.
The segment detail window gives you all the information about the segments of a
single profile. From this window, you can also edit the profile. To access the
Segment Detail Window, you must be in the segment list or in either the user,
group, resource, connected users, or connected groups table.
When you open the segment detail window, on the left pane you see all
segments of the profile. If you select a segment here, you get the detailed
information about the right pane. The right pane has three columns:
Description
A description of the segment.
Fieldvalue
Value of the field. You can edit the value. All empty fields are shown
with a blue-colored <Empty> in this column. When a repeating field
count is zero, a single <Empty> field is shown here, although it does
not exists yet. It enables the user to create the first repeating field by
simply entering a value.
Changed
This column tells you whether any changes you made are yet to be
applied on the mainframe by clicking Apply.
The buttons on the right are the edit options.
4. To edit a field, follow these steps:
a. Select the row you want to change using one of these methods:
v Click the row you want to change then click the row a second time. After
a short pause the Fieldvalue field will open for you to start editing.
v Select the row you want to edit with the tab and arrow keys and press
the Ins key to open the editing dialog.
b. To cancel editing, use the Esc key or select another row.
c. Press Enter to save your changes.
The edit options are listed as follows:
Adding a segment
Use the Add segment option to add a segment directly to a profile.
You can add segments directly to a profile or from the segment detail window. See
“Using the Segment Detail window” on page 130 in information on adding
segments in the segment detail window.
Procedure
To add a segment directly to a profile, complete these steps:
1. In the table, right-click the profile you want to add a segment to.
2. Select Action > Add segment from the main menu, or select Add segment
from the pop-up menu.
Note:
v To propagate the add-segment action across nodes, the segments need to be
very similar.
v The segment is added to the node if possible.
v The segment is added immediately to the nodes.
Exceptions
Use the list in this topic to determine which segments cannot be edited with the
segment detail window.
Most segments exist in the segment list and can be edited with the segment detail
window. There are these exceptions:
v CSDATA segments are shown in SegmentTypes, SegmentList, and Segment Detail
only if present.
v DIGTCERT-CERTDATA is displayed but cannot be edited.
v DIGTCERT-CERTDATA-CERT is not read from the mainframe, as it causes errors
while doing so.
v DIGTCERT-CERTDATA-*RSV* is not read from the mainframe, they are reserved
fields and must not be shown.
Segment fields
Use segment field descriptions in this topic in to get information on the segment
type.
You can find information about segments and segment fields in section “RACF
database templates” of the book “z/OS Security Server RACF Macros and Interfaces”
available at the IBM Knowledge Center for z/OS.
To view the segment fields for a segment type, click on the segment name. In the
segment field table, each column is explained as follows:
Fieldname
The names of the fields as you see them in the segment list.
Repeats
If the fields of the segment display more than once, you find them all in
the segment detail window. In the segment list, you find the number of
repetitions.
Description
The descriptions of the fields as you see them in the segment detail
window.
Command parameter
Lists the parameter that identifies the field in RACF commands that
manipulate the field. This column is filled in only when this parameter is
different from Fieldname.
APPCLU - SESSION
Use this table to determine the fields in the APPCLU- SESSION segment type.
CDT - CDTINFO
Use the fields in the CDT-CDTINFO segment type to define classes in the dynamic
CDT.
The CDTINFO segment is only valid for the CDT resource class. It is used to define
classes in the dynamic CDT.
CFIELD - CFDEF
Use the fields in the CFIELD - CFDEF segment type to define the characteristics of
the field.
The CFDEF (Custom Field DEFinition) segment for CFIELD class profiles defines the
characteristics of the field.
DATASET - DFP
Use this table to determine the fields in the DFP segment type.
DATASET - TME
Use this table to determine the fields in the TME segment type.
DIGTCERT - CERTDATA
Use this table to determine the fields in the DIGTCERT - CERTDATA segment
type.
Because this segment cannot be edited, it appears only in Segment List and
Segment Types.
Because this segment cannot be edited, it appears only in Segment List and
Segment Types.
DLFCLASS - DLFDATA
Use this table to determine the fields in the DLFCLASS - DLFDATA segment type.
EJBROLE - TME
Use the table in this topic to determine the fields in the EJBROLE - TME segment
type.
FACILITY - DLFDATA
Use the table in this topic to determine the fields in the FACILITY - DLFDATA
segment type.
FACILITY - EIM
Use the table in this topic to determine the fields in the FACILITY - EIM segment
type.
FACILITY - PROXY
Use the table in this topic to determine the fields in the FACILITY - PROXY
segment type.
BINDPW and BINDPWKY are read-only fields, so they only exist in SegmentList, not in
Segment Detail.
FACILITY - TME
Use the table in this topic to determine the fields in the FACILITY - TME segment
type.
LDAPBIND - ICTX
Use this table to determine the fields in the LDAPBIND - ICTX segment type.
The ICTX segment in the LDAPBIND class contains information regarding remote
resource management.
USEMAP No USEMAP
DOMAP No DOMAP
MAPREQ No MAPREQUIRED
MAPTIMEO No MAPPINGTIMEOUT
LDAPBIND - PROXY
Use this table to determine the fields in the LDAPBIND - PROXY segment type.
MFADEF - MFPOLICY
Use this table to determine the fields in the MFADEF - MFPOLICY segment type.
PROGRAM - SIGVER
Use this table to determine the fields in the PROGRAM - SIGVER segment type.
The SIGVER (SIGnature VERification) segment for PROGRAM class profiles contains
fields that are verify digital signatures of program modules.
PTKTDATA - SSIGNON
Use this table to determine the fields in the PTKTDATA - SSIGNON segment type.
REALM - KERB
Use this table to determine the fields in the REALM - KERB segment type.
REALM - KERB/CURKEY, CURKEYV, ENCTYPE, PREVKEY, PREVKEYV, and SALT are read-only
fields, so they only exist in SegmentList, not in Segment Detail.
ROLE - TME
Use this table to determine the fields in the ROLE - TME segment type.
SYSMVIEW - SVFMR
Use this table to determine the fields in the SYSMVIEW - SVFMR segment type.
This section describes the fields for the group segment types.
v “GROUP - CSDATA”
v “GROUP - DFP”
v “GROUP - OMVS”
v “GROUP - OVM” on page 143
v “GROUP - TME” on page 143
GROUP - CSDATA
The CSDATA segment of a GROUP profile is where custom fields of that profile are
added.
You can add fields using the RACF CFIELD class to define the new fields to GROUP
profiles and the labels you want to use for them. The fields of this segment are
installation defined.
GROUP - DFP
Use the table in this topic to determine the fields in the GROUP - DFP segment
type.
GROUP - OMVS
Use the table in this topic to determine the fields in the GROUP - OMVS segment
type.
GID The OMVS group identifier. To have the system assign an unused value, use
"auto." If you want more than one group to share the GID, add "s" at the
end of the GID value.
GROUP - OVM
Use the table in this topic to determine the fields in the GROUP - OVM segment
type.
GROUP - TME
Use the table in this topic to determine the fields in the GROUP - TME segment
type.
This section describes the fields for the user segment types.
v “USER - CICS” on page 144
v “USER - CSDATA” on page 144
v “USER - DCE” on page 144
v “USER - DFP” on page 144
v “USER - EIM” on page 144
v “USER - KERB” on page 145
v “USER - LANGUAGE” on page 145
v “USER - LNOTES” on page 145
v “USER - NDS” on page 145
v “USER - NETVIEW” on page 145
v “USER - OMVS” on page 146
v “USER - OPERPARM” on page 146
v “USER - OVM” on page 147
v “USER - PROXY” on page 147
v “USER - TSO” on page 147
v “USER - WORKATTR” on page 148
The CICS segments show information about CICS, an online transaction processing
system. CICS is used to handle large numbers of data transactions from large
computer or terminal networks. This topic shows the fields of the segment.
USER - CSDATA
Use this table to determine the fields in the USER - CSDATA segment type.
The CSDATA segment of a USER profile is where custom fields of that profile are
added. You can add fields using the RACF CFIELD class to define the new fields to
USER profiles and the labels you want to use for them. The fields of this segment
are installation defined.
USER - DCE
Use this table to determine the fields in the USER - DCE segment type.
USER - DFP
Use this table to determine the fields in the USER - DFP segment type.
USER - EIM
Use this table to determine the fields in the USER - EIM segment type.
Segment to store the name of an LDAPBIND class profile. This profile contains the
information needed to connect to the EIM domain on the LDAP host it resides on.
USER - KERB
Use this table to determine the fields in the USER - KERB segment type.
USER - LANGUAGE
Use this table to determine the fields in the USER - LANGUAGE segment type.
USER - LNOTES
Use this table to determine the fields in the USER - LNOTES segment type.
USER - NDS
Use this table to determine the fields in the USER - NDS segment type.
USER - NETVIEW
Use this table to determine the fields in the USER - NETVIEW segment type.
USER - OMVS
Use this table to determine the fields in the USER - OMVS segment type.
The OMVS segment contains logon information for OMVS. OMVS stands for z/OS
UNIX System Services. The OMVS segment provides a z/OS UNIX Security
context, which you need to log on to OMVS.
UID OMVS UID field with the user identifier. To have the system assign an
unused value, fill in "auto." If you want more than one user to share the
UID, add "s" at the end of the UID value.
USER - OPERPARM
Use this table to determine the fields in the USER - OPERPARM segment type.
USER - OVM
Use this table to determine the fields in the USER - OVM segment type.
USER - PROXY
Use this table to determine the fields in the USER - PROXY segment type.
BINDPW and BINDPWKY are read-only fields, so they only exist in SegmentList, not in
Segment Detail.
USER - TSO
Use this table to determine the fields in the USER - TSO segment type.
USER - TSO/TCONS, TOPTION, TPERFORM, TRBA, and TUPT are read-only fields, so they
only exist in SegmentList, not in Segment Detail.
USER - WORKATTR
Use this table to determine the fields in the USER - WORKATTR segment type.
When the Visual Server has been configured to access site-defined REXX scripts,
you can use the Visual Client to select and run a REXX script. You can find more
information in the following topics.
“Prerequisites for running REXX scripts on the Visual Server”
Before you can run site-defined REXX scripts from a Visual Client, an
association file must be created in the Visual Server.
“Running a REXX script in the Visual Client”
Use the Visual Client interface to run a REXX script that is configured on the
Visual Server. The procedure is described in this section.
Use the instructions in "Site-defined REXX scripts" in the Installation and Deployment
Guide to configure an association file for site-specific REXX scripts. You can then
use the Visual Client to select and run a REXX script at the local server node.
Running REXX scripts from remote nodes is not supported.
Scripts will only show when such an association file was defined on the server. If
an association file was not defined on the server, the client will not provide a
message indicating that no REXX scripts have been defined.
Note: Visual Client shows the configured description for the script, not the actual
name of the script.
Procedure
To access the server, a zSecure Visual client needs a local server definition and a
corresponding client definition on the server. With these definitions, a safe
communication channel is created. To set up a new, previously unused channel, an
initial password is needed once. The client definition contains more information
than the server definition; otherwise they are similar.
The mainframe provides limited support for managing client definitions. For more
information, see the section about configuring zSecure Visual clients in the server
in the IBM Security zSecure CARLa-Driven Components: Installation and Deployment
Guide.
PC Mainframe
Server ID Server ID
Server IP address or name Server IP address or name
Server TCP Port Server TCP Port
Client ID Client ID
Local Port Local Port
- -
- Status
Initial password Remarks
Initial password
Figure 75. Server and client definitions needed for communication between the server and a
client
Note: The initial password is displayed only after being generated and
only as long as the window remains open. Newly created client
definitions are automatically assigned an initial password.
The server attributes are shown at the top of the window: Server ID, IP address
or name, and TCP Port. For information about server fields and creating server
definitions on the client, see “Server definition parameters” on page 7.
v Select the Add button to add a single definition.
v Select the Edit button to edit a single definition.
v To delete one or more definitions, select the entries and click Delete.
v Use the Undelete button to activate a deleted definition.
v To generate one or more new passwords, select the definitions and click Initial
password.
Use the Batch Add dialog to create multiple client definitions using a single action.
When the batch run finishes, the Maintain Client window is displayed showing
the new entries with initial passwords. See Figure 76 on page 152.
After you create a client definition, you must specify these attributes for the client:
v Server IP address or name
v Server TCP port number
v Client ID
v Initial password
These attributes are used to create the corresponding server definition. The client
and server definitions enable the client to log on to the server. See “Server
definition parameters” on page 7 for more information.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
If you are viewing this information in softcopy form, the photographs and color
illustrations might not be displayed.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the Web at “Copyright and
trademark information” at www.ibm.com/legal/copytrade.shtml.
Adobe, the Adobe logo, Acrobat, PostScript, and the PostScript logo are either
registered trademarks or trademarks of Adobe Systems Incorporated in the United
States, and/or other countries.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo,
Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or
registered trademarks of Intel Corporation or its subsidiaries in the United States
and other countries.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Linear Tape-Open, LTO, the LTO Logo, Ultrium and the Ultrium Logo are
trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries.
Other company, product, and service names may be trademarks or service marks
of others.
Notices 157
158 Client Manual
Glossary
CKG profile processing is bypassed. The list is stored
A number of profiles in the XFACILIT in the DATASET profile of the GLOBAL
class control access to the CKGRACF class.
commands. The profile names start with
HLQ High Level Qualifier or first qualifier. The
"CKG." Note: If the Site Module general
left-most part of a data set name; the
resource class name is customized during
string of letters before the first period.
the server setup, as described in the IBM
Security zSecure CARLa-Driven Components: ID User ID or group name.
Installation and Deployment Guide, the class
Member
with the specified name controls access to
Profile members are used to create a list
the CKGRACF commands, rather than the
of entries associated with a profile.
XFACILIT class.
MVS A mainframe operating system.
Access authority
The authority a user needs to access a Owner
protected resource. The higher the Every profile has an owner. The user or
authority, the more a user is ed to do. group that owns the profile can view,
change, and delete that profile.
Class All RACF entities, such as, users and
resources, are categorized into classes. Permit
The Class Descriptor Table contains a Permitted accessability of a user or group
description of all classes except USER, to specified resources.
GROUP, and DATASET.
Profile
Class Descriptor Table A description of the security-relevant
An assembled RACF table that contains characteristics of one or more users,
entries for all general resource classes. groups, or resources. A profile is divided
into segments.
CKGRACF
Short mainframe program name for a Proftype
utility that issues authority-sensitive Profile type. For general resources, it can
RACF commands. Component of IBM be discrete or generic. For data sets, it can
Security zSecure. be generic, nonvsam, vsam, tapedsn, or
model.
CKRCARLA
Short mainframe program name for the RACF Resource Access Control Facility. A
IBM Security zSecure application. security program that provides access
control on an MVS or a VM environment
Connect
by user identification, access
A profile that connects a user to a group.
authorization, etc. Renamed to SecureWay
Depending on the attributes of the
Security Server.
connect, a user has different
authorizations. RRSF RACF Remote Sharing Facility. The IBM
RRSF allows RACF to communicate with
General Resource
other IBM z/OS systems that use RACF,
Anything that RACF can protect except
allowing you to maintain remote RACF
users, groups, and data sets. For example,
databases. An RRSF node is an MVS
by default the CKG profiles reside in the
system image, or a group of MVS system
XFACILIT class, which is a general
images sharing a RACF database.
resource class.
Schedule
Global Access Table (GAT)
Schedules enable you to set and run
A fast way to allow access to all users,
timed commands, such as revoke
except restricted users, to a list of
intervals. For example, the administrator
resources. Most RACF authority
can define a future interval for the period
© Copyright IBM Corp. 1998, 2017 159
that a user is on vacation. On the
specified start date of the vacation, the
user is revoked automatically. At the end
of the specified period, the user is
resumed by the system.
Segment
Part of a profile that contains a specific
part of the identification.
Setropts
A command to set system-wide z/OS
options related to resource protection (Set
RACF Options).
Setropts erase
RACF command.
Subgroup
A group becomes a subgroup of the
group is has as a superior group.
Supgroup
Every group except SYS1 has one superior
group. The hierarchy created this way
plays an important role in the way access
is granted.
Universal Access Authority (UACC)
Part of a data set or resource profile that
defines the default access that is granted
if a user or group is not granted explicit
access (except restricted users, which have
no access through UACC). Note that for
sensitive resources, the UACC is usually
set to NONE.
Userid
User ID, unique identification for a RACF
user.
z/OS A mainframe operating system,
containing MVS as a component.
Index 163
F group (continued)
auditor attribute
Helpdesk administration level 27
hide unauthorized functions 27
F1 key 17 Scope dialog 46 high level qualifier (HLQ) 45
FACILITY - DLFDATA 139 delete 94 HLQ (high level qualifier) 45
FACILITY - EIM 139 designing structure 122 HOME segment, Duplicate user 66
FACILITY - PROXY 139 display as resource profile 42
FACILITY - TME 139 Extra Selection Fields Find Dialog 85
fields
group profile segments 142
finding 38
list scope 46
I
user profile segments 143 IBM
management 85
Fieldvalue Software Support xi
operations attribute
Segment Detail 130 Support Assistant xi
Scope dialog 46
Filter option IBM Eclipse Help System 1
profile segments
Scope dialog 46 ICSF 136
GROUP - CSDATA 142
search 38 ICTX 140
GROUP - DFP 142
find 38 ID
GROUP - OMVS 143
Advanced option 38 add to access list 120
GROUP - OVM 143
Exact option 38 edit access list 121
GROUP - TME 143
extra fields for users 55 ID * option, Scope * dialog 50
properties 87
Filter option 38 ID column, access list 118
properties, viewing 21
Find window always on top ID options
purpose 122
option 25 Scope dialog 46
remove connects 94
group 38 IDIDMAP profile 82, 112
remove permits 94
Mask option 38 import server definition 6
special attribute
resource 38 Inactive
Scope dialog 46
Segments option 38 User table 55
table 85
user 38 Inactive status
wrong display 42
Find dialog 38 User properties 62
Group
Extra Selection Fields Groups 85 Initial password
Add subgroup 89
Installation data 110 Maintain Client 151
administration level 27
Owner 110 Server definition 7
Connect properties 99
Segment 110 initial password client attribute 1, 153
Duplicate group 91
Find users dialog 55 Initial program segment
extra fields in find dialog 85
folder, Visual client program 2 Duplicate user 66
properties 87
font installation
table 85
change font dialogs 25 complete 2
GROUP - CSDATA 142
change font table 25 custom 2
GROUP - DFP 142
format, date 29 methods, Visual client 2
GROUP - OMVS 143
forms, Status of ... 37 requirements 1
GROUP - OVM 143
Full administration level 27 setup program 2
GROUP - TME 143
silent 14
Group properties dialog 87
software requirements 1
Group table
G printing 33
uninstallation 5
Visual client
GAT, refresh 126 group tree
hardware requirements 1
gAud 97 change font 25
Visual client, prerequisites 1
Connect properties 99 Load Complete option 44
Installation data
Create connect 102 scope 44
Add subgroup 89
option, Scope dialog 46 viewing 44
Duplicate group 91
GCSFKEYS - ICSF 136 grouping class 122
Duplicate user 66
generic data set profile gSpec
Group properties 87
group 91 Connect properties 99
Group table 85
user 66 Connects table 97
Properties of resource profile 116
Generic Resource profile 110 Create connect 102
Resources table 110
GID option, Scope dialog 46
User properties 62
Duplicate group 91 GXCSFKEY - ICSF 136
User table 55
OMVS group identifier 143 InstData
Global Access Table Add resource profile 113
option, Scope dialog 46 H Group table 85
refresh 126 HasPassword Resources table 110
gOper User table 55 User table 55
Connect properties 99 HasPhrase interface authorization levels 27
Connects table 97 User table 55 interface level, setting 25
Create connect 102 help interval
option, Scope dialog 46 installation 2 add to schedule 81
group requirements for using 1 delete schedule 82
Add subgroup 89 viewing information 17 in schedule 79
HelpContact, Server definition 7 repeat schedule 81
Index 165
options Previous password properties (continued)
add diagnostic messages to print 25 Set password 75 Group 87
change font dialogs 25 printing Inactive 62
change font table 25 menus 32 Installation data 62
confirm exit 25 messages and return codes 24 Installation Data 87
date format 25 preview 33 Last connect 62
default connect owner 25 tables 33 Last logon 62
Find window always on top 25 problem-determination xi Last password change 62
include access due to group profile Mappings count 62
operations 25 add segment 130, 132 Name 62
include access due to system CKG 27 Operations 62
operations 25 DATASET 110 Owner 62, 87
include profiles 25 delete resource 118 Password attempts 62
interface level 25 edit resource 116 Password interval 62
use multi-system services 25 generic 110 resource profile 116
Options dialog 25 group segments 142 Revoked 62
OVM 143, 147 IDIDMAP 82, 112 Security label 62
Owner mapping 82 Security level 62
Add resource profile 113 members 122 Special 62
Connect properties 99 members, exceptional uses 123 SubGroups 87
Duplicate user 66 resource 110 SupGroup 87
Group properties 87 resource, duplicate 115 TermUACC 87
Group table 85 Segment Detail, Changed Universal 87
Properties of resource profile 116 column 130 user 55
Resources table 110 segments of resource 134 User 62
User table 55 user segments 143 user ID 62
Owner attribute view properties 130 viewing 21
User properties 62 view Segment Detail window 130 Properties of resource profile dialog 116
warning mode 46 Protected
Profile User properties 62
P Add resource profile 113
Properties of resource profile 116
User table 55
PROXY 139, 140, 147
PADCHK field, adding member 124
Resources table 110 PTKDATA - SSIGNON 141
passphrase
Profile filter publications
setting 73
Scope * dialog 50 accessing online v, vi, viii
Passphrase expired
Scope dialog 46 list of for this product v, vi, viii
User properties 62
Profile in Warning obtain licensed publications vi
password
Scope dialog 46 obtaining licensed v
changing 19
Profile type PwdExpireDate
default 75
Properties of resource profile 116 User table 55
new 75
ProfType
remove 79
Resources table 110
resetting 75
resume 76
PROGRAM
Duplicate user 66
Q
set default 76 question mark, used in tables 34
PROGRAM - SIGVER 140
set to previous 75 quit 22
PROGRAM class, adding member 124
setting 73
program folder, Visual client 2
Password
properties
Duplicate user 66
Password attempts
Auditor 62 R
Categories 62 RACF 70, 97
User properties 62
Class authorizations 62 limitations on multi-node actions 118
Password interval attribute
connect logon 19
User properties 62
Authority 99 navigating databases 35
paste special 30
Connect Revoked 99 selecting multiple databases 36
percentage (%) character, filtering 38
Created 99 SETROPTS settings 52
permits 45
gAud 99 SYSPRINT output 24
printing 33
gOper 99 verifying changes 37
remove user 105
Group 99 Read column, access list 118
Permits dialog 45
gSpec 99 REALM- KERB 141
PhrExpired
Last connect 99 Reason
User table 55
Owner 99 Add schedule interval 81
PhrExpireDate
Resume Date 99 Schedules 80
User table 55
Revoke Date 99 Set password 76
Port conflict
User 99 refresh
avoid 7
Created 62, 87 class 126
prerequisites for Visual client
DefaultGrp 62 GAT 126
installation 1
Expired 62 segment 130
Index 167
Scope dialog (continued) server SNAME
Warning 46 definition name, turn off 22 Duplicate user 66
When 46 edit definition 7 software installation requirements 1
scope of group tree 44 information 33 sort column by entry 17
search name client attribute 153 Special user attribute 62
all nodes 38 TCP port number client attribute 1, SSIGNON 141
class 38 153 Start column
filtering 38 test connection 7 Schedules 80
Find window always on top 38 server definition Start field
segment option 38 add 7 Add schedule interval 81
selected nodes 38 add multiple 9 STARTED - STDATA 142
selected nodes, advanced 38 copy 10 Status field
view each node in a separate Delete 6 Maintain Client 151
table 38 Export 6 Status of ... form 37
Security label attribute Import 6 status, verifying completion 37
User properties 62 settings 1 STDATA 142
Security level attribute Server definition dialog 7 subgroup, add 89
User properties 62 Server ID SubGroups
segment client attribute 1, 153 Group properties 87
access 127 server attributes 151 Group table 85
add 130, 132 Server definition 7 superior group in group tree 44
add field 130 Server Information dialog 33 Supgroup
application 128 server IP address client attribute 1, 153 Add subgroup 89
authorities 127 Server IP address or name Duplicate group 91
delete 130 Server definition 7 SupGroup
edit 130 Server Port Group properties 87
exceptions to editing 133 Server definition 7 Group table 85
fields, viewing 134 SESSION 135 support
list, viewing 130 session, establishing with server 18 Visual client versions 6
management 127 set SVFMR 142
related classes 128 default password 76 SYS1 group 44
resource profiles 134 password or passphrase 73 SYSMVIEW - SVFMR 142
Segment Detail Set Passphrase SYSPRINT, view output 24
Description 130 User properties 62 SYSPRINT.log 23
Fieldvalue 130 Set password dialog 74 system audit report 52
settings 127 Set password to expired SYSTERM, view messages 24
types Set password 76 SYSTERM.log 23
edit 127 set up Visual client 1
view 127 Set user as protected
view 127
Segment
Set password or passphrase 73
Set user as Protected
T
tables
detail window 130 Duplicate user 66
change font 25
Duplicate group 91 SETROPTS settings report 52
Connects 97
Duplicate user 66 settings, configuration file 11
exporting 32
Group table 85 setup
fields out of scope 34
list table 130 automated 10
group 85
option in search 38 configuration file 10
Installation data 85
Resources table 110 configuration file examples 13
InstData 85
types table 127 configuration file limitations 12
member 123
User table 55 create configuration file 10
Owner 85
Segmenttypes list 127 Modify option 5
Resources 110
Select class dialog 42 repair client files 5
Segment 85
Activate 42 uninstallation 5
Segment list 130
Active Classes 42 upgrade 6
Segment type 127
All Classes 42 Visual client, prerequisites 1
Segmenttypes 127
Authorized Classes 42 SHOW MYACCESS command 89
SubGroup 85
Class 42 ShowHost=No option 22
SupGroup 85
Description 42 SIGVER 140
types to print 33
Select Node for group tree dialog 44 silent installation
User 55
Select Nodes dialog 36 diagnostics 14
Users 85
alternative ID dropdown 36 log files 14
Visual client compatibility 6
AT option 36 steps 14
TCP Port, server attributes 151
ONLYAT option 36 site-specific columns and fields 31
terminology v
RRSF Nodes 36 site-specific fields
TermUACC
zSecure Nodes 36 Find dialog 38
Group properties 87
sequence, change column 31 User properties 62
Test connection
User table 55
Server definition 7
Index 169
W
Warning
Add resource profile 113
Properties of resource profile 116
Resources table 110
warning mode, profile 46
When
add to access list 120
edit access list 121
field, access list 118
windows
Communication 24
Maintain Client 151
Mapping information 82
Segment detail 130
Windows long date format 29
Windows short date format 29
WORKATTR 148
X
XCSFKEY - ICSF 136
Z
z/OS UNIX group (grpid) 91
z/OS, supported release 1
zSecure Nodes option 36
zSecure server, logon 19
zSecure-defined node 20
Printed in USA
SC27-5647-04