SlideShare a Scribd company logo
1 of 23
VSE BSM Hints and Tips Presented by:  John Lawson illustro Systems 1950 Stemmons Frwy. Suite 2016 Dallas, Texas 75207 Phone: 214-800-8900  http://www.illustro.com Copy of presentations available at: www.illustro.com/conferences
Trademarks The following are registered trademarks of International Business Machines Corporation CICS IBM The following are trademarks of International Business Machines Corporation CICS/VSE  COBOL/VSE PL/I VSE VSE/ESA ESA/390 POWER VTAM C/VSE MVS/ESA VM/ESA S/390 All other trademarks are trademarks of their respective companies.
Basic Security Manager ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic Security Manager… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSM Transaction Security  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],All transactions must be defined to BSM!!!
BSM Transaction Security… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSM Transaction Security… IESADMSL.IESEBSEC  SECURITY MAINTENANCE  APPLID: ADICCFT  Enter the number of your selection and press the ENTER key:  1  BSM Resource Profile Maintenance  2  BSM Group Maintenance  3  BSM Security Rebuild  4  Maintain Certificate - User ID List  5  Define Transaction Security  PF1=HELP  3=END  4=RETURN  6=ESCAPE(U) 9=Escape(m)   z/VSE 3.1.1+
BSM Transaction Security… TAS$SEC4  MIGRATE SECURITY ENTRIES  Enter the required data and press ENTER.  The security concept of the Basic Security Manager (BSM) has changed.  You are recommended to migrate your entries and use the dialog  Maintain Security Profiles.  The  DTSECTXN table as used by this dialog can still be used in parallel to the  new BSM control file.  MIGRATE...................... 1  Do you want to migrate the trans-  action security entries?  Enter 1 for YES.  Enter 2 to proceed with the Define  Transaction Security dialog.  Migrate own security definitions in macro format?  Migrate Member..........  __________________________________  PF1=HELP  2=REDISPLAY  3=END  TO MIGRATE PRESS PF6 IN MAINTAIN USER PROFILE DIALOG.   z/VSE 3.1.1+
BSM Transaction Security… TAS$SEC1  DEFINE TRANSACTION SECURITY  Enter the required data and press ENTER.  OPTIONS: 1 = ADD  2 = ALTER  5 = DELETE  OPT  TRANSACTION NAME  CICS REGION  SECURITY CLASS  GENERIC _  CEDC  1  _  CEDF  1  _  CEDF  PRODCICS  5  _  CEGN  1  _  CEHP  1  _  CEHS  1  _  CEMS  1  _  CEMT  7  _  CEMT  PRODCICS  60  _  CEOS  1  LOCATE TRANSACTION NAME == >  ____  INCLUDE MEMBER == >  IJSYSRS.SYSLIB.DTSECTXM.A  PF1=HELP  2=REDISPLAY  3=END  5=PROCESS  PF7=BACKWARD  8=FORWARD  DTSECTXN method
BSM Transaction Security… TAS$SEC2  DEFINE TRANSACTION SECURITY: ADD ENTRIES  Enter the required data and press ENTER.  TRANSACTION  CICS  SECURITY  GENERIC  NAME  REGION  CLASS  C___  ________  1  x  CEDF  PRODCICS  5  _  CEMT  ________  7  _  CEMT  PRODCICS  60  _  0___  ________  1  x  1___  ________  1  x  ____  ________  1  _  ____  ________  1  _  ____  ________  1  _  ____  ________  1  _  PF1=HELP  2=REDISPLAY  3=END  DTSECTXN method
BSM Transaction Security… IESADMUPR1  ADD OR CHANGE RESOURCE ACCESS RIGHTS  Base  II  CICS  ResClass ICCF  Place an 'X' next to the transaction security keys for user TEST  01 X  02 X  03 X  04 X  05 X  06 X  07 X  08 X  09 X  10 X  11 X  12 X  13 X  14 X  15 X  16 X  17 X  18 X  19 X  20 X  21 X  22 X  23 X  24 X  25 X  26 X  27 X  28 X  29 X  30 X  31 X  32 X  33 X  34 X  35 X  36 X  37 X  38 X  39 X  40 X  41 X  42 X  43 X  44 X  45 X  46 X  47 X  48 X  49 X  50 X  51 X  52 X  53 X  54 X  55 X  56 X  57 X  58 X  59 X  60 X  61 X  62 X  63 X  64 X  Specify the access rights for 1-32 DTSECTAB access control classes  ( _=No access, 1=Connect, 2=Read, 3=Update, 4=Alter )  01 _  02 _  03 _  04 _  05 _  06 _  07 _  08 _  09 _  10 _  11 _  12 _  13 _  14 _  15 _  16 _  17 _  18 _  19 _  20 _  21 _  22 _  23 _  24 _  25 _  26 _  27 _  28 _  29 _  30 _  31 _  32 _  READ DIRECTORY..... 1  User can read directory with Connect (1=yes, 2=no)  B-TRANSIENTS....... 1  User can manipulate B-Transients  (1=yes, 2=no)  PF1=HELP  3=END  5=UPDATE  PF7=BACKWARD  8=FORWARD  DTSECTXN method - User Profile
BSM Transaction Security… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSM Transaction Security… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSM Resource Security (3.1.1+) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSM Resource Security (3.1.1+)… IESADMBSLE  MAINTAIN SECURITY PROFILES  BSM RESOURCE CLASS:  TCICSTRN  ACTIVE  START....  OPTIONS:  1 = ADD  2 = CHANGE  5 = DELETE  6 = ACCESS LIST  OPT  PROFILE NAME  DESCRIPTION  UNIVERSAL  ACCESS  _  emai  MIGRATED  _  ftp  MIGRATED  _  iccf  MIGRATED  _  lpr  MIGRATED  _  newc  MIGRATED  _  ping  MIGRATED  _  ...  MIGRATED  _  ...  MIGRATED  _  CEMT  MIGRATED  _  PRODCICS.CEMT  MIGRATED  _   *0  GENERIC 0XXX TRANS _  *1  GENERIC 1XXX TRANS  PF1=HELP  3=END  PF7=BACKWARD  8=FORWARD  9=PRINT
BSM Resource Security (3.1.1+)… IESADMBSLA  MAINTAIN ACCESS LIST  BSM  CLASS: TCICSTRN  PROFILE:  CEMT  START....  NUMBER OF ENTRIES ON LIST:  00004  OPTIONS:  1 = ADD  2 = CHANGE  5 = DELETE  OPT  NAME  ACC  _  OPERS  2  _  PROGRS  2  _  MANAGERS 2  _  GROUP07  2  PF1=HELP  3=END  PF7=BACKWARD  8=FORWARD
BSM Resource Security (3.1.1+)… IESADMBSLG  MAINTAIN SECURITY PROFILES  BSM RESOURCE CLASS:  GROUP  START....  OPTIONS:  1 = ADD  2 = CHANGE  5 = DELETE  6 = USER LIST  USERID  OPT  GROUP NAME  DESCRIPTION  CONNECTED?  ________  _  OPERS    Operator group  _  PROGRS  Programmer group  _  MANAGERS  Prog Managers  _  GROUP01  Default security  _  GROUP02    CETR CSFE NETT users   _  GROUP03  CMSG CWTO users  _  GROUP04  CEDA CEDB AISW users  _  GROUP05  CEBR CEDC CEDF users  _  GROUP06  CEDA CEDB CEDF users  _  GROUP07  CEMT CEOT CEST users  _  GROUP08  CICS category 1 usrs  _  GROUP09  CEMS CEOS users  PF1=HELP  3=END  PF7=TOP  8=FORWARD  9=PRINT
BSM Resource Security (3.1.1+)… IESADMBSLU  MAINTAIN USER LIST  BSM  CLASS:  GROUP  GROUP: OPERS  START....  OPTIONS:  1 = ADD  5 = DELETE  OPT  USERID  _  CABO  _  CAB1  _  FAST  _  OPS0  _  OPS1  _  SLOW  _  ZZZZ  _  _  _  PF1=HELP  3=END   PF7=BACKWARD  8=FORWARD
BSM Resource Security (3.1.1+)… IESADMBSLE  MAINTAIN SECURITY PROFILES  BSM RESOURCE CLASS:  FACILITY  ACTIVE  START....  DFHRCF.RSL16  (CASE SENSITIVE)  OPTIONS:  1 = ADD  2 = CHANGE  5 = DELETE  6 = ACCESS LIST  OPT  PROFILE NAME  DESCRIPTION  UNIVERSAL AUDIT >  ACCESS VALUE _  DFHRCF.RSL16  12 _  DFHRCF.RSL17  12 _  DFHRCF.RSL18  12 _  DFHRCF.RSL19  12 _  DFHRCF.RSL20  12 _  DFHRCF.RSL21  12 _  DFHRCF.RSL22  12 _  DFHRCF.RSL23  12 _  DFHRCF.RSL24  12 _  DITTO.DISK.UPDATE  All DITTO DISK updts  12 _  DITTO.TAPE.UPDATE  All DITTO TAPE updts  12 _  DITTO.VSAM.UPDATE  All DITTO VSAM updts  12 PF1=HELP  3=END  PF7=BACKWARD  8=FORWARD  9=PRINT  11=NAME RIGHT
BSM Password Controls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSM Password Controls… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other BSM Usages ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Now Its Your Turn Anybody got anything they want to contribute?

More Related Content

Similar to WAVV 2009 - VSE BSM Hints and Tips

Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!
Teddy Reed
 
The license associated with the Belarc Advisor product allows
 The license associated with the Belarc Advisor product allows The license associated with the Belarc Advisor product allows
The license associated with the Belarc Advisor product allows
MikeEly930
 
Georgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityGeorgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software security
DefconRussia
 
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Anne Nicolas
 
Kernel Recipes 2017: Performance Analysis with BPF
Kernel Recipes 2017: Performance Analysis with BPFKernel Recipes 2017: Performance Analysis with BPF
Kernel Recipes 2017: Performance Analysis with BPF
Brendan Gregg
 

Similar to WAVV 2009 - VSE BSM Hints and Tips (20)

Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!
 
Data Tracking: On the Hunt for Information about Your Database
Data Tracking: On the Hunt for Information about Your DatabaseData Tracking: On the Hunt for Information about Your Database
Data Tracking: On the Hunt for Information about Your Database
 
The license associated with the Belarc Advisor product allows
 The license associated with the Belarc Advisor product allows The license associated with the Belarc Advisor product allows
The license associated with the Belarc Advisor product allows
 
EKON22 Introduction to Machinelearning
EKON22 Introduction to MachinelearningEKON22 Introduction to Machinelearning
EKON22 Introduction to Machinelearning
 
Georgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityGeorgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software security
 
BPF Tools 2017
BPF Tools 2017BPF Tools 2017
BPF Tools 2017
 
bcc/BPF tools - Strategy, current tools, future challenges
bcc/BPF tools - Strategy, current tools, future challengesbcc/BPF tools - Strategy, current tools, future challenges
bcc/BPF tools - Strategy, current tools, future challenges
 
IBM Informix dynamic server 11 10 Cheetah Sql Features
IBM Informix dynamic server 11 10 Cheetah Sql FeaturesIBM Informix dynamic server 11 10 Cheetah Sql Features
IBM Informix dynamic server 11 10 Cheetah Sql Features
 
r2con 2017 r2cLEMENCy
r2con 2017 r2cLEMENCyr2con 2017 r2cLEMENCy
r2con 2017 r2cLEMENCy
 
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
 
Kernel Recipes 2017: Performance Analysis with BPF
Kernel Recipes 2017: Performance Analysis with BPFKernel Recipes 2017: Performance Analysis with BPF
Kernel Recipes 2017: Performance Analysis with BPF
 
MySQL 8 -- A new beginning : Sunshine PHP/PHP UK (updated)
MySQL 8 -- A new beginning : Sunshine PHP/PHP UK (updated)MySQL 8 -- A new beginning : Sunshine PHP/PHP UK (updated)
MySQL 8 -- A new beginning : Sunshine PHP/PHP UK (updated)
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
Performance tuning a quick intoduction
Performance tuning   a quick intoductionPerformance tuning   a quick intoduction
Performance tuning a quick intoduction
 
re:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at Netflixre:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at Netflix
 
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data Masking
 
Cisco San switch troublehooting Guide
Cisco San switch troublehooting GuideCisco San switch troublehooting Guide
Cisco San switch troublehooting Guide
 
Oracle dbms_xplan.display_cursor format
Oracle dbms_xplan.display_cursor formatOracle dbms_xplan.display_cursor format
Oracle dbms_xplan.display_cursor format
 
Data Encryption at Rest
Data Encryption at RestData Encryption at Rest
Data Encryption at Rest
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

WAVV 2009 - VSE BSM Hints and Tips

  • 1. VSE BSM Hints and Tips Presented by: John Lawson illustro Systems 1950 Stemmons Frwy. Suite 2016 Dallas, Texas 75207 Phone: 214-800-8900 http://www.illustro.com Copy of presentations available at: www.illustro.com/conferences
  • 2. Trademarks The following are registered trademarks of International Business Machines Corporation CICS IBM The following are trademarks of International Business Machines Corporation CICS/VSE COBOL/VSE PL/I VSE VSE/ESA ESA/390 POWER VTAM C/VSE MVS/ESA VM/ESA S/390 All other trademarks are trademarks of their respective companies.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. BSM Transaction Security… IESADMSL.IESEBSEC SECURITY MAINTENANCE APPLID: ADICCFT Enter the number of your selection and press the ENTER key: 1 BSM Resource Profile Maintenance 2 BSM Group Maintenance 3 BSM Security Rebuild 4 Maintain Certificate - User ID List 5 Define Transaction Security PF1=HELP 3=END 4=RETURN 6=ESCAPE(U) 9=Escape(m) z/VSE 3.1.1+
  • 8. BSM Transaction Security… TAS$SEC4 MIGRATE SECURITY ENTRIES Enter the required data and press ENTER. The security concept of the Basic Security Manager (BSM) has changed. You are recommended to migrate your entries and use the dialog Maintain Security Profiles. The DTSECTXN table as used by this dialog can still be used in parallel to the new BSM control file. MIGRATE...................... 1 Do you want to migrate the trans- action security entries? Enter 1 for YES. Enter 2 to proceed with the Define Transaction Security dialog. Migrate own security definitions in macro format? Migrate Member.......... __________________________________ PF1=HELP 2=REDISPLAY 3=END TO MIGRATE PRESS PF6 IN MAINTAIN USER PROFILE DIALOG. z/VSE 3.1.1+
  • 9. BSM Transaction Security… TAS$SEC1 DEFINE TRANSACTION SECURITY Enter the required data and press ENTER. OPTIONS: 1 = ADD 2 = ALTER 5 = DELETE OPT TRANSACTION NAME CICS REGION SECURITY CLASS GENERIC _ CEDC 1 _ CEDF 1 _ CEDF PRODCICS 5 _ CEGN 1 _ CEHP 1 _ CEHS 1 _ CEMS 1 _ CEMT 7 _ CEMT PRODCICS 60 _ CEOS 1 LOCATE TRANSACTION NAME == > ____ INCLUDE MEMBER == > IJSYSRS.SYSLIB.DTSECTXM.A PF1=HELP 2=REDISPLAY 3=END 5=PROCESS PF7=BACKWARD 8=FORWARD DTSECTXN method
  • 10. BSM Transaction Security… TAS$SEC2 DEFINE TRANSACTION SECURITY: ADD ENTRIES Enter the required data and press ENTER. TRANSACTION CICS SECURITY GENERIC NAME REGION CLASS C___ ________ 1 x CEDF PRODCICS 5 _ CEMT ________ 7 _ CEMT PRODCICS 60 _ 0___ ________ 1 x 1___ ________ 1 x ____ ________ 1 _ ____ ________ 1 _ ____ ________ 1 _ ____ ________ 1 _ PF1=HELP 2=REDISPLAY 3=END DTSECTXN method
  • 11. BSM Transaction Security… IESADMUPR1 ADD OR CHANGE RESOURCE ACCESS RIGHTS Base II CICS ResClass ICCF Place an 'X' next to the transaction security keys for user TEST 01 X 02 X 03 X 04 X 05 X 06 X 07 X 08 X 09 X 10 X 11 X 12 X 13 X 14 X 15 X 16 X 17 X 18 X 19 X 20 X 21 X 22 X 23 X 24 X 25 X 26 X 27 X 28 X 29 X 30 X 31 X 32 X 33 X 34 X 35 X 36 X 37 X 38 X 39 X 40 X 41 X 42 X 43 X 44 X 45 X 46 X 47 X 48 X 49 X 50 X 51 X 52 X 53 X 54 X 55 X 56 X 57 X 58 X 59 X 60 X 61 X 62 X 63 X 64 X Specify the access rights for 1-32 DTSECTAB access control classes ( _=No access, 1=Connect, 2=Read, 3=Update, 4=Alter ) 01 _ 02 _ 03 _ 04 _ 05 _ 06 _ 07 _ 08 _ 09 _ 10 _ 11 _ 12 _ 13 _ 14 _ 15 _ 16 _ 17 _ 18 _ 19 _ 20 _ 21 _ 22 _ 23 _ 24 _ 25 _ 26 _ 27 _ 28 _ 29 _ 30 _ 31 _ 32 _ READ DIRECTORY..... 1 User can read directory with Connect (1=yes, 2=no) B-TRANSIENTS....... 1 User can manipulate B-Transients (1=yes, 2=no) PF1=HELP 3=END 5=UPDATE PF7=BACKWARD 8=FORWARD DTSECTXN method - User Profile
  • 12.
  • 13.
  • 14.
  • 15. BSM Resource Security (3.1.1+)… IESADMBSLE MAINTAIN SECURITY PROFILES BSM RESOURCE CLASS: TCICSTRN ACTIVE START.... OPTIONS: 1 = ADD 2 = CHANGE 5 = DELETE 6 = ACCESS LIST OPT PROFILE NAME DESCRIPTION UNIVERSAL ACCESS _ emai MIGRATED _ ftp MIGRATED _ iccf MIGRATED _ lpr MIGRATED _ newc MIGRATED _ ping MIGRATED _ ... MIGRATED _ ... MIGRATED _ CEMT MIGRATED _ PRODCICS.CEMT MIGRATED _ *0 GENERIC 0XXX TRANS _ *1 GENERIC 1XXX TRANS PF1=HELP 3=END PF7=BACKWARD 8=FORWARD 9=PRINT
  • 16. BSM Resource Security (3.1.1+)… IESADMBSLA MAINTAIN ACCESS LIST BSM CLASS: TCICSTRN PROFILE: CEMT START.... NUMBER OF ENTRIES ON LIST: 00004 OPTIONS: 1 = ADD 2 = CHANGE 5 = DELETE OPT NAME ACC _ OPERS 2 _ PROGRS 2 _ MANAGERS 2 _ GROUP07 2 PF1=HELP 3=END PF7=BACKWARD 8=FORWARD
  • 17. BSM Resource Security (3.1.1+)… IESADMBSLG MAINTAIN SECURITY PROFILES BSM RESOURCE CLASS: GROUP START.... OPTIONS: 1 = ADD 2 = CHANGE 5 = DELETE 6 = USER LIST USERID OPT GROUP NAME DESCRIPTION CONNECTED? ________ _ OPERS Operator group _ PROGRS Programmer group _ MANAGERS Prog Managers _ GROUP01 Default security _ GROUP02 CETR CSFE NETT users _ GROUP03 CMSG CWTO users _ GROUP04 CEDA CEDB AISW users _ GROUP05 CEBR CEDC CEDF users _ GROUP06 CEDA CEDB CEDF users _ GROUP07 CEMT CEOT CEST users _ GROUP08 CICS category 1 usrs _ GROUP09 CEMS CEOS users PF1=HELP 3=END PF7=TOP 8=FORWARD 9=PRINT
  • 18. BSM Resource Security (3.1.1+)… IESADMBSLU MAINTAIN USER LIST BSM CLASS: GROUP GROUP: OPERS START.... OPTIONS: 1 = ADD 5 = DELETE OPT USERID _ CABO _ CAB1 _ FAST _ OPS0 _ OPS1 _ SLOW _ ZZZZ _ _ _ PF1=HELP 3=END PF7=BACKWARD 8=FORWARD
  • 19. BSM Resource Security (3.1.1+)… IESADMBSLE MAINTAIN SECURITY PROFILES BSM RESOURCE CLASS: FACILITY ACTIVE START.... DFHRCF.RSL16 (CASE SENSITIVE) OPTIONS: 1 = ADD 2 = CHANGE 5 = DELETE 6 = ACCESS LIST OPT PROFILE NAME DESCRIPTION UNIVERSAL AUDIT > ACCESS VALUE _ DFHRCF.RSL16 12 _ DFHRCF.RSL17 12 _ DFHRCF.RSL18 12 _ DFHRCF.RSL19 12 _ DFHRCF.RSL20 12 _ DFHRCF.RSL21 12 _ DFHRCF.RSL22 12 _ DFHRCF.RSL23 12 _ DFHRCF.RSL24 12 _ DITTO.DISK.UPDATE All DITTO DISK updts 12 _ DITTO.TAPE.UPDATE All DITTO TAPE updts 12 _ DITTO.VSAM.UPDATE All DITTO VSAM updts 12 PF1=HELP 3=END PF7=BACKWARD 8=FORWARD 9=PRINT 11=NAME RIGHT
  • 20.
  • 21.
  • 22.
  • 23. Now Its Your Turn Anybody got anything they want to contribute?