SlideShare a Scribd company logo
1 of 23
Download to read offline
VSE BSM Hints and Tips Presented by:  John Lawson illustro Systems 1950 Stemmons Frwy. Suite 2016 Dallas, Texas 75207 Phone: 214-800-8900  http://www.illustro.com Copy of presentations available at: www.illustro.com/conferences
Trademarks The following are registered trademarks of International Business Machines Corporation CICS IBM The following are trademarks of International Business Machines Corporation CICS/VSE  COBOL/VSE PL/I VSE VSE/ESA ESA/390 POWER VTAM C/VSE MVS/ESA VM/ESA S/390 All other trademarks are trademarks of their respective companies.
Basic Security Manager ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic Security Manager… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSM Transaction Security  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],All transactions must be defined to BSM!!!
BSM Transaction Security… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSM Transaction Security… IESADMSL.IESEBSEC  SECURITY MAINTENANCE  APPLID: ADICCFT  Enter the number of your selection and press the ENTER key:  1  BSM Resource Profile Maintenance  2  BSM Group Maintenance  3  BSM Security Rebuild  4  Maintain Certificate - User ID List  5  Define Transaction Security  PF1=HELP  3=END  4=RETURN  6=ESCAPE(U) 9=Escape(m)   z/VSE 3.1.1+
BSM Transaction Security… TAS$SEC4  MIGRATE SECURITY ENTRIES  Enter the required data and press ENTER.  The security concept of the Basic Security Manager (BSM) has changed.  You are recommended to migrate your entries and use the dialog  Maintain Security Profiles.  The  DTSECTXN table as used by this dialog can still be used in parallel to the  new BSM control file.  MIGRATE...................... 1  Do you want to migrate the trans-  action security entries?  Enter 1 for YES.  Enter 2 to proceed with the Define  Transaction Security dialog.  Migrate own security definitions in macro format?  Migrate Member..........  __________________________________  PF1=HELP  2=REDISPLAY  3=END  TO MIGRATE PRESS PF6 IN MAINTAIN USER PROFILE DIALOG.   z/VSE 3.1.1+
BSM Transaction Security… TAS$SEC1  DEFINE TRANSACTION SECURITY  Enter the required data and press ENTER.  OPTIONS: 1 = ADD  2 = ALTER  5 = DELETE  OPT  TRANSACTION NAME  CICS REGION  SECURITY CLASS  GENERIC _  CEDC  1  _  CEDF  1  _  CEDF  PRODCICS  5  _  CEGN  1  _  CEHP  1  _  CEHS  1  _  CEMS  1  _  CEMT  7  _  CEMT  PRODCICS  60  _  CEOS  1  LOCATE TRANSACTION NAME == >  ____  INCLUDE MEMBER == >  IJSYSRS.SYSLIB.DTSECTXM.A  PF1=HELP  2=REDISPLAY  3=END  5=PROCESS  PF7=BACKWARD  8=FORWARD  DTSECTXN method
BSM Transaction Security… TAS$SEC2  DEFINE TRANSACTION SECURITY: ADD ENTRIES  Enter the required data and press ENTER.  TRANSACTION  CICS  SECURITY  GENERIC  NAME  REGION  CLASS  C___  ________  1  x  CEDF  PRODCICS  5  _  CEMT  ________  7  _  CEMT  PRODCICS  60  _  0___  ________  1  x  1___  ________  1  x  ____  ________  1  _  ____  ________  1  _  ____  ________  1  _  ____  ________  1  _  PF1=HELP  2=REDISPLAY  3=END  DTSECTXN method
BSM Transaction Security… IESADMUPR1  ADD OR CHANGE RESOURCE ACCESS RIGHTS  Base  II  CICS  ResClass ICCF  Place an 'X' next to the transaction security keys for user TEST  01 X  02 X  03 X  04 X  05 X  06 X  07 X  08 X  09 X  10 X  11 X  12 X  13 X  14 X  15 X  16 X  17 X  18 X  19 X  20 X  21 X  22 X  23 X  24 X  25 X  26 X  27 X  28 X  29 X  30 X  31 X  32 X  33 X  34 X  35 X  36 X  37 X  38 X  39 X  40 X  41 X  42 X  43 X  44 X  45 X  46 X  47 X  48 X  49 X  50 X  51 X  52 X  53 X  54 X  55 X  56 X  57 X  58 X  59 X  60 X  61 X  62 X  63 X  64 X  Specify the access rights for 1-32 DTSECTAB access control classes  ( _=No access, 1=Connect, 2=Read, 3=Update, 4=Alter )  01 _  02 _  03 _  04 _  05 _  06 _  07 _  08 _  09 _  10 _  11 _  12 _  13 _  14 _  15 _  16 _  17 _  18 _  19 _  20 _  21 _  22 _  23 _  24 _  25 _  26 _  27 _  28 _  29 _  30 _  31 _  32 _  READ DIRECTORY..... 1  User can read directory with Connect (1=yes, 2=no)  B-TRANSIENTS....... 1  User can manipulate B-Transients  (1=yes, 2=no)  PF1=HELP  3=END  5=UPDATE  PF7=BACKWARD  8=FORWARD  DTSECTXN method - User Profile
BSM Transaction Security… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSM Transaction Security… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSM Resource Security (3.1.1+) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSM Resource Security (3.1.1+)… IESADMBSLE  MAINTAIN SECURITY PROFILES  BSM RESOURCE CLASS:  TCICSTRN  ACTIVE  START....  OPTIONS:  1 = ADD  2 = CHANGE  5 = DELETE  6 = ACCESS LIST  OPT  PROFILE NAME  DESCRIPTION  UNIVERSAL  ACCESS  _  emai  MIGRATED  _  ftp  MIGRATED  _  iccf  MIGRATED  _  lpr  MIGRATED  _  newc  MIGRATED  _  ping  MIGRATED  _  ...  MIGRATED  _  ...  MIGRATED  _  CEMT  MIGRATED  _  PRODCICS.CEMT  MIGRATED  _   *0  GENERIC 0XXX TRANS _  *1  GENERIC 1XXX TRANS  PF1=HELP  3=END  PF7=BACKWARD  8=FORWARD  9=PRINT
BSM Resource Security (3.1.1+)… IESADMBSLA  MAINTAIN ACCESS LIST  BSM  CLASS: TCICSTRN  PROFILE:  CEMT  START....  NUMBER OF ENTRIES ON LIST:  00004  OPTIONS:  1 = ADD  2 = CHANGE  5 = DELETE  OPT  NAME  ACC  _  OPERS  2  _  PROGRS  2  _  MANAGERS 2  _  GROUP07  2  PF1=HELP  3=END  PF7=BACKWARD  8=FORWARD
BSM Resource Security (3.1.1+)… IESADMBSLG  MAINTAIN SECURITY PROFILES  BSM RESOURCE CLASS:  GROUP  START....  OPTIONS:  1 = ADD  2 = CHANGE  5 = DELETE  6 = USER LIST  USERID  OPT  GROUP NAME  DESCRIPTION  CONNECTED?  ________  _  OPERS    Operator group  _  PROGRS  Programmer group  _  MANAGERS  Prog Managers  _  GROUP01  Default security  _  GROUP02    CETR CSFE NETT users   _  GROUP03  CMSG CWTO users  _  GROUP04  CEDA CEDB AISW users  _  GROUP05  CEBR CEDC CEDF users  _  GROUP06  CEDA CEDB CEDF users  _  GROUP07  CEMT CEOT CEST users  _  GROUP08  CICS category 1 usrs  _  GROUP09  CEMS CEOS users  PF1=HELP  3=END  PF7=TOP  8=FORWARD  9=PRINT
BSM Resource Security (3.1.1+)… IESADMBSLU  MAINTAIN USER LIST  BSM  CLASS:  GROUP  GROUP: OPERS  START....  OPTIONS:  1 = ADD  5 = DELETE  OPT  USERID  _  CABO  _  CAB1  _  FAST  _  OPS0  _  OPS1  _  SLOW  _  ZZZZ  _  _  _  PF1=HELP  3=END   PF7=BACKWARD  8=FORWARD
BSM Resource Security (3.1.1+)… IESADMBSLE  MAINTAIN SECURITY PROFILES  BSM RESOURCE CLASS:  FACILITY  ACTIVE  START....  DFHRCF.RSL16  (CASE SENSITIVE)  OPTIONS:  1 = ADD  2 = CHANGE  5 = DELETE  6 = ACCESS LIST  OPT  PROFILE NAME  DESCRIPTION  UNIVERSAL AUDIT >  ACCESS VALUE _  DFHRCF.RSL16  12 _  DFHRCF.RSL17  12 _  DFHRCF.RSL18  12 _  DFHRCF.RSL19  12 _  DFHRCF.RSL20  12 _  DFHRCF.RSL21  12 _  DFHRCF.RSL22  12 _  DFHRCF.RSL23  12 _  DFHRCF.RSL24  12 _  DITTO.DISK.UPDATE  All DITTO DISK updts  12 _  DITTO.TAPE.UPDATE  All DITTO TAPE updts  12 _  DITTO.VSAM.UPDATE  All DITTO VSAM updts  12 PF1=HELP  3=END  PF7=BACKWARD  8=FORWARD  9=PRINT  11=NAME RIGHT
BSM Password Controls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSM Password Controls… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other BSM Usages ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Now Its Your Turn Anybody got anything they want to contribute?

More Related Content

Similar to WAVV 2009 - VSE BSM Hints and Tips

Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Teddy Reed
 
Data Tracking: On the Hunt for Information about Your Database
Data Tracking: On the Hunt for Information about Your DatabaseData Tracking: On the Hunt for Information about Your Database
Data Tracking: On the Hunt for Information about Your DatabaseMichael Rosenblum
 
The license associated with the Belarc Advisor product allows
 The license associated with the Belarc Advisor product allows The license associated with the Belarc Advisor product allows
The license associated with the Belarc Advisor product allowsMikeEly930
 
EKON22 Introduction to Machinelearning
EKON22 Introduction to MachinelearningEKON22 Introduction to Machinelearning
EKON22 Introduction to MachinelearningMax Kleiner
 
Georgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityGeorgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityDefconRussia
 
bcc/BPF tools - Strategy, current tools, future challenges
bcc/BPF tools - Strategy, current tools, future challengesbcc/BPF tools - Strategy, current tools, future challenges
bcc/BPF tools - Strategy, current tools, future challengesIO Visor Project
 
IBM Informix dynamic server 11 10 Cheetah Sql Features
IBM Informix dynamic server 11 10 Cheetah Sql FeaturesIBM Informix dynamic server 11 10 Cheetah Sql Features
IBM Informix dynamic server 11 10 Cheetah Sql FeaturesKeshav Murthy
 
r2con 2017 r2cLEMENCy
r2con 2017 r2cLEMENCyr2con 2017 r2cLEMENCy
r2con 2017 r2cLEMENCyRay Song
 
Kernel Recipes 2017: Performance Analysis with BPF
Kernel Recipes 2017: Performance Analysis with BPFKernel Recipes 2017: Performance Analysis with BPF
Kernel Recipes 2017: Performance Analysis with BPFBrendan Gregg
 
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...Anne Nicolas
 
MySQL 8 -- A new beginning : Sunshine PHP/PHP UK (updated)
MySQL 8 -- A new beginning : Sunshine PHP/PHP UK (updated)MySQL 8 -- A new beginning : Sunshine PHP/PHP UK (updated)
MySQL 8 -- A new beginning : Sunshine PHP/PHP UK (updated)Dave Stokes
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Paula Januszkiewicz
 
Performance tuning a quick intoduction
Performance tuning   a quick intoductionPerformance tuning   a quick intoduction
Performance tuning a quick intoductionRiyaj Shamsudeen
 
re:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at Netflixre:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at NetflixBrendan Gregg
 
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Paula Januszkiewicz
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingSolidQ
 
Cisco San switch troublehooting Guide
Cisco San switch troublehooting GuideCisco San switch troublehooting Guide
Cisco San switch troublehooting GuideDayal Ghosh
 
Oracle dbms_xplan.display_cursor format
Oracle dbms_xplan.display_cursor formatOracle dbms_xplan.display_cursor format
Oracle dbms_xplan.display_cursor formatFranck Pachot
 

Similar to WAVV 2009 - VSE BSM Hints and Tips (20)

Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!
 
Data Tracking: On the Hunt for Information about Your Database
Data Tracking: On the Hunt for Information about Your DatabaseData Tracking: On the Hunt for Information about Your Database
Data Tracking: On the Hunt for Information about Your Database
 
The license associated with the Belarc Advisor product allows
 The license associated with the Belarc Advisor product allows The license associated with the Belarc Advisor product allows
The license associated with the Belarc Advisor product allows
 
EKON22 Introduction to Machinelearning
EKON22 Introduction to MachinelearningEKON22 Introduction to Machinelearning
EKON22 Introduction to Machinelearning
 
Georgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityGeorgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software security
 
bcc/BPF tools - Strategy, current tools, future challenges
bcc/BPF tools - Strategy, current tools, future challengesbcc/BPF tools - Strategy, current tools, future challenges
bcc/BPF tools - Strategy, current tools, future challenges
 
BPF Tools 2017
BPF Tools 2017BPF Tools 2017
BPF Tools 2017
 
IBM Informix dynamic server 11 10 Cheetah Sql Features
IBM Informix dynamic server 11 10 Cheetah Sql FeaturesIBM Informix dynamic server 11 10 Cheetah Sql Features
IBM Informix dynamic server 11 10 Cheetah Sql Features
 
r2con 2017 r2cLEMENCy
r2con 2017 r2cLEMENCyr2con 2017 r2cLEMENCy
r2con 2017 r2cLEMENCy
 
Kernel Recipes 2017: Performance Analysis with BPF
Kernel Recipes 2017: Performance Analysis with BPFKernel Recipes 2017: Performance Analysis with BPF
Kernel Recipes 2017: Performance Analysis with BPF
 
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
 
MySQL 8 -- A new beginning : Sunshine PHP/PHP UK (updated)
MySQL 8 -- A new beginning : Sunshine PHP/PHP UK (updated)MySQL 8 -- A new beginning : Sunshine PHP/PHP UK (updated)
MySQL 8 -- A new beginning : Sunshine PHP/PHP UK (updated)
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
Performance tuning a quick intoduction
Performance tuning   a quick intoductionPerformance tuning   a quick intoduction
Performance tuning a quick intoduction
 
re:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at Netflixre:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at Netflix
 
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data Masking
 
Cisco San switch troublehooting Guide
Cisco San switch troublehooting GuideCisco San switch troublehooting Guide
Cisco San switch troublehooting Guide
 
Oracle dbms_xplan.display_cursor format
Oracle dbms_xplan.display_cursor formatOracle dbms_xplan.display_cursor format
Oracle dbms_xplan.display_cursor format
 
Data Encryption at Rest
Data Encryption at RestData Encryption at Rest
Data Encryption at Rest
 

Recently uploaded

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

WAVV 2009 - VSE BSM Hints and Tips

  • 1. VSE BSM Hints and Tips Presented by: John Lawson illustro Systems 1950 Stemmons Frwy. Suite 2016 Dallas, Texas 75207 Phone: 214-800-8900 http://www.illustro.com Copy of presentations available at: www.illustro.com/conferences
  • 2. Trademarks The following are registered trademarks of International Business Machines Corporation CICS IBM The following are trademarks of International Business Machines Corporation CICS/VSE COBOL/VSE PL/I VSE VSE/ESA ESA/390 POWER VTAM C/VSE MVS/ESA VM/ESA S/390 All other trademarks are trademarks of their respective companies.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. BSM Transaction Security… IESADMSL.IESEBSEC SECURITY MAINTENANCE APPLID: ADICCFT Enter the number of your selection and press the ENTER key: 1 BSM Resource Profile Maintenance 2 BSM Group Maintenance 3 BSM Security Rebuild 4 Maintain Certificate - User ID List 5 Define Transaction Security PF1=HELP 3=END 4=RETURN 6=ESCAPE(U) 9=Escape(m) z/VSE 3.1.1+
  • 8. BSM Transaction Security… TAS$SEC4 MIGRATE SECURITY ENTRIES Enter the required data and press ENTER. The security concept of the Basic Security Manager (BSM) has changed. You are recommended to migrate your entries and use the dialog Maintain Security Profiles. The DTSECTXN table as used by this dialog can still be used in parallel to the new BSM control file. MIGRATE...................... 1 Do you want to migrate the trans- action security entries? Enter 1 for YES. Enter 2 to proceed with the Define Transaction Security dialog. Migrate own security definitions in macro format? Migrate Member.......... __________________________________ PF1=HELP 2=REDISPLAY 3=END TO MIGRATE PRESS PF6 IN MAINTAIN USER PROFILE DIALOG. z/VSE 3.1.1+
  • 9. BSM Transaction Security… TAS$SEC1 DEFINE TRANSACTION SECURITY Enter the required data and press ENTER. OPTIONS: 1 = ADD 2 = ALTER 5 = DELETE OPT TRANSACTION NAME CICS REGION SECURITY CLASS GENERIC _ CEDC 1 _ CEDF 1 _ CEDF PRODCICS 5 _ CEGN 1 _ CEHP 1 _ CEHS 1 _ CEMS 1 _ CEMT 7 _ CEMT PRODCICS 60 _ CEOS 1 LOCATE TRANSACTION NAME == > ____ INCLUDE MEMBER == > IJSYSRS.SYSLIB.DTSECTXM.A PF1=HELP 2=REDISPLAY 3=END 5=PROCESS PF7=BACKWARD 8=FORWARD DTSECTXN method
  • 10. BSM Transaction Security… TAS$SEC2 DEFINE TRANSACTION SECURITY: ADD ENTRIES Enter the required data and press ENTER. TRANSACTION CICS SECURITY GENERIC NAME REGION CLASS C___ ________ 1 x CEDF PRODCICS 5 _ CEMT ________ 7 _ CEMT PRODCICS 60 _ 0___ ________ 1 x 1___ ________ 1 x ____ ________ 1 _ ____ ________ 1 _ ____ ________ 1 _ ____ ________ 1 _ PF1=HELP 2=REDISPLAY 3=END DTSECTXN method
  • 11. BSM Transaction Security… IESADMUPR1 ADD OR CHANGE RESOURCE ACCESS RIGHTS Base II CICS ResClass ICCF Place an 'X' next to the transaction security keys for user TEST 01 X 02 X 03 X 04 X 05 X 06 X 07 X 08 X 09 X 10 X 11 X 12 X 13 X 14 X 15 X 16 X 17 X 18 X 19 X 20 X 21 X 22 X 23 X 24 X 25 X 26 X 27 X 28 X 29 X 30 X 31 X 32 X 33 X 34 X 35 X 36 X 37 X 38 X 39 X 40 X 41 X 42 X 43 X 44 X 45 X 46 X 47 X 48 X 49 X 50 X 51 X 52 X 53 X 54 X 55 X 56 X 57 X 58 X 59 X 60 X 61 X 62 X 63 X 64 X Specify the access rights for 1-32 DTSECTAB access control classes ( _=No access, 1=Connect, 2=Read, 3=Update, 4=Alter ) 01 _ 02 _ 03 _ 04 _ 05 _ 06 _ 07 _ 08 _ 09 _ 10 _ 11 _ 12 _ 13 _ 14 _ 15 _ 16 _ 17 _ 18 _ 19 _ 20 _ 21 _ 22 _ 23 _ 24 _ 25 _ 26 _ 27 _ 28 _ 29 _ 30 _ 31 _ 32 _ READ DIRECTORY..... 1 User can read directory with Connect (1=yes, 2=no) B-TRANSIENTS....... 1 User can manipulate B-Transients (1=yes, 2=no) PF1=HELP 3=END 5=UPDATE PF7=BACKWARD 8=FORWARD DTSECTXN method - User Profile
  • 12.
  • 13.
  • 14.
  • 15. BSM Resource Security (3.1.1+)… IESADMBSLE MAINTAIN SECURITY PROFILES BSM RESOURCE CLASS: TCICSTRN ACTIVE START.... OPTIONS: 1 = ADD 2 = CHANGE 5 = DELETE 6 = ACCESS LIST OPT PROFILE NAME DESCRIPTION UNIVERSAL ACCESS _ emai MIGRATED _ ftp MIGRATED _ iccf MIGRATED _ lpr MIGRATED _ newc MIGRATED _ ping MIGRATED _ ... MIGRATED _ ... MIGRATED _ CEMT MIGRATED _ PRODCICS.CEMT MIGRATED _ *0 GENERIC 0XXX TRANS _ *1 GENERIC 1XXX TRANS PF1=HELP 3=END PF7=BACKWARD 8=FORWARD 9=PRINT
  • 16. BSM Resource Security (3.1.1+)… IESADMBSLA MAINTAIN ACCESS LIST BSM CLASS: TCICSTRN PROFILE: CEMT START.... NUMBER OF ENTRIES ON LIST: 00004 OPTIONS: 1 = ADD 2 = CHANGE 5 = DELETE OPT NAME ACC _ OPERS 2 _ PROGRS 2 _ MANAGERS 2 _ GROUP07 2 PF1=HELP 3=END PF7=BACKWARD 8=FORWARD
  • 17. BSM Resource Security (3.1.1+)… IESADMBSLG MAINTAIN SECURITY PROFILES BSM RESOURCE CLASS: GROUP START.... OPTIONS: 1 = ADD 2 = CHANGE 5 = DELETE 6 = USER LIST USERID OPT GROUP NAME DESCRIPTION CONNECTED? ________ _ OPERS Operator group _ PROGRS Programmer group _ MANAGERS Prog Managers _ GROUP01 Default security _ GROUP02 CETR CSFE NETT users _ GROUP03 CMSG CWTO users _ GROUP04 CEDA CEDB AISW users _ GROUP05 CEBR CEDC CEDF users _ GROUP06 CEDA CEDB CEDF users _ GROUP07 CEMT CEOT CEST users _ GROUP08 CICS category 1 usrs _ GROUP09 CEMS CEOS users PF1=HELP 3=END PF7=TOP 8=FORWARD 9=PRINT
  • 18. BSM Resource Security (3.1.1+)… IESADMBSLU MAINTAIN USER LIST BSM CLASS: GROUP GROUP: OPERS START.... OPTIONS: 1 = ADD 5 = DELETE OPT USERID _ CABO _ CAB1 _ FAST _ OPS0 _ OPS1 _ SLOW _ ZZZZ _ _ _ PF1=HELP 3=END PF7=BACKWARD 8=FORWARD
  • 19. BSM Resource Security (3.1.1+)… IESADMBSLE MAINTAIN SECURITY PROFILES BSM RESOURCE CLASS: FACILITY ACTIVE START.... DFHRCF.RSL16 (CASE SENSITIVE) OPTIONS: 1 = ADD 2 = CHANGE 5 = DELETE 6 = ACCESS LIST OPT PROFILE NAME DESCRIPTION UNIVERSAL AUDIT > ACCESS VALUE _ DFHRCF.RSL16 12 _ DFHRCF.RSL17 12 _ DFHRCF.RSL18 12 _ DFHRCF.RSL19 12 _ DFHRCF.RSL20 12 _ DFHRCF.RSL21 12 _ DFHRCF.RSL22 12 _ DFHRCF.RSL23 12 _ DFHRCF.RSL24 12 _ DITTO.DISK.UPDATE All DITTO DISK updts 12 _ DITTO.TAPE.UPDATE All DITTO TAPE updts 12 _ DITTO.VSAM.UPDATE All DITTO VSAM updts 12 PF1=HELP 3=END PF7=BACKWARD 8=FORWARD 9=PRINT 11=NAME RIGHT
  • 20.
  • 21.
  • 22.
  • 23. Now Its Your Turn Anybody got anything they want to contribute?