IBM Security Z Security

Security for Z

Join this online user group to communicate across Z Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only
Expand all | Collapse all

Roles in zSecure

  • 1.  Roles in zSecure

    Posted 2 days ago

    Hello
    We want to create roles in our zSecure for using zSecure. Unfortunately, the documentation is very poor in this regard. The only role that is covered is that of the helpdesk. And that is only via the Visual Server. However, we do not use the Visual Server (nor do we intend to in the future) and work via the ISPF interface.
    Can anyone help me?
    We want to set up the following roles:
    Admin – RACF administrators with all rights
    Auditor – The person who is supposed to audit us but is not allowed to make any changes.
    User administrator – Restricted to certain areas only (Group Special)
    External employees – Employees who support us but do not have full system SPECIAL access.
    Many thanks 
    Stephan



    ------------------------------
    Stephan Reichelt
    ------------------------------


  • 2.  RE: Roles in zSecure
    Best Answer

    Posted 2 days ago

    hi Stephan, 

    a way that you can consider to accomplish these job roles for your types of zSecure users is as flollows: 

    • Set up a RACF group for each of the zSecure job roles that you mention
    • Connect the current zSecure users to the group that matches with their job role
    • Permit each role group with the appropriate zSecure-related resources that you want them to be able to use:
      • XFACILIT resources CKR.OPTION.** can be used to control which zSecure Menu options you want to allow/deny access to for each job role
      • XFACILIT resources CKR.ACTION.** can be used to control which zSecure Action commands you want to allow/deny access to for each job role
      • READ access is required for the users to be allowed to process the input resources that zSecure supports (for example, RACF primary, RACF backup(s) RACF copy, RACF unload, SMF live reocrds, SMF dumped records, CKFREEZE data sets, Accesss monitor data sets, locally defined data sets (if used))
    • Besides these authorizations, your users need the appropriate RACF authority (SPECIAL, OPERATIONS, AUDITOR, ROAUDIT, class authorizations, and/or access to IRR.** FACILITY class resources. But since these are existing users, I assume that the zSecure users already have (most of) these RACF authorizations.

    Hope this helps.



    ------------------------------
    Tom Zeehandelaar
    z/OS Security Enablement Specialist - zSecure developer
    IBM
    ------------------------------



  • 3.  RE: Roles in zSecure

    Posted 2 days ago

    Hello John,
    Thank you very much for your quick and competent reply. As you correctly identified, the standard definitions already exist in RACF. I am just confused by the different profiles in zSecure in XFACILITY, or rather, the description is somewhat inadequate for someone who is self-taught like me (it would be nice if, as in other IBM manuals, there were more practical examples). We have set up profiles in XFACILITY (not by me) where I am not even sure if they are needed. There are also profiles that, according to the manual, are for the Visual Server, which we do not use at all. Even if you look at the XFACILITY class in the RACF Access Monitor, profiles are used where I still don't understand why. As I said, the manual is not particularly helpful in this regard. Are there any 'secret' documents where you can learn about this at a simpler level?

    Thank you for your support.
    Best regards
    Stephan



    ------------------------------
    Stephan Reichelt
    ------------------------------



  • 4.  RE: Roles in zSecure

    Posted 2 days ago

    Sorry...I mean Tom :)



    ------------------------------
    Stephan Reichelt
    ------------------------------



  • 5.  RE: Roles in zSecure

    Posted 2 days ago

    Hi Stephan,

    I don't have completely clear what XFACILITY profiles you might have a question about. :/

    The C2R prefix is for zSecure Visual functionality (and now also used in the Web UI that replaces it).

    The B8R prefix is for the RACF-Offline component of zSecure Admin.

    The CKF prefix is for controlling the zSecure Collect for z/OS (CKFCOLL) program, which builds the system snapshot file (CKFREEZE).

    The CKG prefix is for the CKGRACF component of zSecure Admin. In particular, you can define a user's ability to use CKGRACF commands to update the RACF database at a granular level. The CKGRACF scope is also part of the overall scope of various scoping functionalities in the product.
    There are some details here: https://www.ibm.com/docs/en/szs/3.1.0?topic=manual-ckgracf-quick-reference

    There are several CKN* prefixes for working the with zSecure Server (CKNSERVE), which connects to other systems for remote command execution (and remote reading) etc.

    CKR is the general zSecure prefix (also used for CKRCARLA operation).
    There are CKR.ACTION and CKR.OPTION resources for defining what is shown / can be used in the ISPF UI, see 
    https://www.ibm.com/docs/en/szs/3.1.0?topic=controls-resources-that-configure-which-options-are-shown and 
    https://www.ibm.com/docs/en/szs/3.1.0?topic=iic-resources-that-configure-which-line-commands-are-allowed
    CKR.CKRCARLA.APF controls if CKRCARLA can be run with APF authorization.
    The CKR.CKXLOG.** resources are for controlling the use of the Command Logger (CKXLOG) component of zSecure Admin.
    CKR.READALL determines if you can see everything in the RACF database, or if the program should run in restricted mode when you don't have a read permit to the database (and hide things that are no in your scope).

    CKX is for the Command Executor (CKX) component.

    C2X is for the RACF Exit Activator (C2X) component.

    C4R is the zSecure Command Verifier prefix.

    Let me know how I can help you further...

    Regards,



    ------------------------------
    Jeroen Tiggelman
    IBM - Software Development Manager IBM Security zSecure
    Delft
    ------------------------------



  • 6.  RE: Roles in zSecure

    Posted 2 days ago

    Hello Jeroen,
    Thank you very much for your help.
    I will extract some profiles from our database and from the RACF Access Monitor over the course of next week and would like to get back to you with them, if that is okay. Under the same thread?
    Best regards
    Stephan



    ------------------------------
    Stephan Reichelt
    ------------------------------



  • 7.  RE: Roles in zSecure

    Posted 18 hours ago

    Hi Stephan,

    Yes, that is fine. I follow this Community via individual emails, so I should see it regardless of what thread you post in.

    Regards,



    ------------------------------
    Jeroen Tiggelman
    IBM - Software Development Manager IBM Security zSecure
    Delft
    ------------------------------



  • 8.  RE: Roles in zSecure

    Posted 2 days ago

    Hi Stephan, 

    Perhaps, you are already aware of this documentation, but just in case you do not.

    Here's a link to more detailed information regarding "Resources that configure which options are shown" in chapter "Security setup for zSecure", section "ISPF interface controls" of the zSecure Installation and Deployment guide: https://www.ibm.com/docs/en/szs/3.1.0?topic=controls-resources-that-configure-which-options-are-shown.

    I have no knowledge of other 'secret' documents that could clarify any remaining questions that you might have about this topic!

    Regards,



    ------------------------------
    Tom Zeehandelaar
    z/OS Security Enablement Specialist - zSecure developer
    IBM
    ------------------------------



  • 9.  RE: Roles in zSecure

    Posted 2 days ago

    Hi Tom,
    Thanks, I'll take a look at that.
    Best regards
    Stephan



    ------------------------------
    Stephan Reichelt
    ------------------------------



  • 10.  RE: Roles in zSecure

    Posted 2 days ago

    Hi Stephan,

    Since we announced last December that zSecure Visual will be end of marketing this September, I hope no one intends to start with that in future.
    The same levels that are used in zSecure Visual can also be used in the zSecure Admin web interface that we introduced with zSecure Admin 3.1.1 last October.

    Under ISPF, there are some simple sets of administration tasks in the RA.H (Helpdesk) and RA.Q (Quick admin) menus.

    Regards,
    Jeroen



    ------------------------------
    Jeroen Tiggelman
    IBM - Software Development Manager IBM Security zSecure
    Delft
    ------------------------------



  • 11.  RE: Roles in zSecure

    Posted 2 days ago

    Hello Jeroen,
    Thank you for your quick reply.
    We had already looked at the new web interface, but as old Hosties, it wasn't for us :)
    Best regards
    Stephan



    ------------------------------
    Stephan Reichelt
    ------------------------------



  • 12.  RE: Roles in zSecure

    Posted 20 hours ago

    Hi Stephan,

    Bluntly speaking, at its core, zSecure is merely a reporting tool.  It allows its users to view information from the RACF database and the system.  If those users happen to have a RACF privilege (SPECIAL, GROUP SPECIAL, OWNER of profiles), they can also generate commands to modify profiles.  If they have no privilege in RACF, they may be able to see, but not change things.  From this point of view, there is no real need for roles.

    In order to see RACF profiles, zSecure needs READ access to a RACF data source.  This can be a READ PERMIT for the PRIMARY RACF database, or the BACKUP database.  You can also use a scheduled batch job to create a (daily?) snapshot of (a) RACF database, and offer this to the users by doing into SE.D.1 from the maintainer's user ID, and creating a Set of input files with the snapshot dsname and type UNLOAD.  For installations with more interest in securing their RACF database, you can also install the zSecure network server (CKNSERVE) to give administrators live access to the RACF database, but without requiring a PERMIT to the RACF data set(s). The CKNSERVE access is controlled (only) through XFACILIT profiles starting with CKN.

    Once the user has READ access to one of the 4 RACF data sources, zSecure emulates RACF administration rules to determine what it shows the user.  Again, in vanilla mode, you do not need CKR or CKG profiles.  It immediately shows GROUP SPECIAL users the profiles in their scope, just like the RACF commands would.  Note, the presence of profiles is shown if the user has READ permit on a profile, but not all details.  If the user has the SYSTEM SPECIAL privilege, all profiles will be shown, but not the AUDIT related fields.  If the user has SYSTEM AUDIT or ROAUDIT they may see more fields in profiles.

    There are cases where the administrators (SPECIAL) need to see all fields, or production control staff needs to see all profiles.  This is before RACF got the ROAUDIT privilege.  To disable the built-in scope filters, zSecure uses XFACILIT CKR.READALL, to display (read) all profiles and profile fields.  Some zSecure components (C2POLICE, CKQRADAR) don't function well without a PERMIT on this profile.  It would also be of benefit for technical administrators that have been given group special (or class authority) but need to see all groups or users to better do their admin work.

    Note, this allows the users to SEE information from RACF, the ability to make changes is strictly controlled with the user's native RACF privilege.

    In order to see system information, or user catalog information to manage users, zSecure uses the CKFREEZE data sets.  To write into a CKFREEZE a batch job needs PERMIT on XFACILIT CKF.** (or less generic).  The users do not need this permit, they merely need READ access to the CKFREEZE data set, and the name of the CKFREEZE must be stated in their Set of input files via SE.1 or SE.D.1.

    OK, now we move from vanilla zSecure to zSecure on steroids.  Before RACF brought IRR.LISTUSER, IRR.PASSWORD, IRR.PWRESET capabilities, there was a need to support decentralized administration without relying on group special.  This was implemented using the (optional) CKGRACF command.  This command only works when it sits in an APF authorized library, and only works in TSO when it is in one of the command lists in IKJTSOxx.  The user must have READ permit on one or more CKG profiles to make use of CKGRACF.  If CKGRACF is available, zSecure calls it from the ISPF interface to populate the menu and action command controls that Tom mentioned, using the CKGRACF SHOW MYACCESS command.

    CKGRACF also has support for TIMED commands, where you can grant permits for a future date, and have the permit deleted after a given time, and much more.  Do not grant access to CKGRACF unless you have identified a real need for it.  Make sure you don't have widely generic CKG profiles only because it was activated during a trial (or POC).  Note: CKGRACF is optional, many installations do not need it, or only use it because of the SHOW MYACCESS command.

    The 4 basic roles you described can be implemented with RACF privileges, READ permit on one of the RACF data sources and CKFREEZE data sets, and CKR.READALL for some (or all) of the central team.



    ------------------------------
    Rob van Hoboken
    ------------------------------