Skip to main content (Press Enter).
Sign in
Skip auxiliary navigation (Press Enter).
Skip main navigation (Press Enter).
Toggle navigation
Home
Groups
Events
Upcoming Community Events
All Community Events
z/OS Communications Server - Group home
Back to Blog List
zERT | Best practices: Sorting out the different z/OS user IDs involved with the zERT Network Analyzer
2
Like
With z/OS Encryption Readiness Technology (zERT), you are now able to
discover and analyze the status of the network cryptographic protection of your z/OS TCP and Enterprise Extender workloads.
If you have adopted zERT, you might
already be familiar with IBM zERT Network Analyzer which makes it easy for you to query and analyze the data that zERT provides.
Based on some of recent discussions we've had, there seems to be some confusion over the different z/OS user IDs involved with the zERT Network Analyzer, and which SAF permissions each one requires. This blog entry will hopefully clear up that confusion.
There are three different types of z/OS user IDs involved with the zERT Network Analyzer.
1.
The
z/OSMF server’s user ID
This is the z/OSMF started task user ID ( the user ID under which z/OSMF and zERT Network Analyzer plug-in execute). When the network analyzer imports SMF data from SMF dump data sets, it is running under the z/OSMF user ID. Because of this, the network analyzer requires the z/OSMF user ID to have one permission beyond those required by z/OSMF itself.
Required a
uthorization:
Th
e z/OSMF user
ID must
have READ access to
the SMF dump data sets
from which the network analyzer imports zERT SMF records.
2
.
zERT Network Analyzer end
-
user ID
These are the user IDs that log into t
he zERT Network Analyzer plug-in to use the functions
the network analyzer
offers.
Any user ID that needs to log into the the zERT Network Analyzer plug-in must have the appropriate SAF permission to access the plugin.
Required a
uthorization:
The zERT Network Analyzer
end-user user IDs must have proper access to a couple different SAF resources.
See the IZUNASEC sample in
setting up security for the z/OSMF plug-ins
for details on how to
permit this access
via SAF group IZUZNA.
It is also important to note that when a network analyzer user exports the results of a network analyzer query, the export operation is performed under the logged-in user's user ID instead of the z/OSMF user ID. This way, the zERT Network Analyzer ensures that export files written to the z/OS Unix file system will be written according to the logged-in user's z/OS Unix credentials.
3
.
zERT Network Analyzer database user ID
This is a separate, dedicated user ID that the zERT Network Analyzer uses to connect to the Db2 for z/OS database. All the zERT Network Analyzer database operations are executed under this user ID, including queries, insertions, and deletions. This user ID is configured on the zERT Network Analyzer Database Settings panel and must have the appropriate set of permissions to perform the database operations that the network analyzer requires.
Tip:
Create a separate, dedicated user ID for this purpose.
Required Db2 privileges:
Before you start
the zERT Network Analyzer
, you
MUST provide t
h
is
user ID
with the
following
Db2 privileges
to ensure proper operation
s
of
various network analyzer
functions:
INSERT, SELECT, UPDATE, DELETE privileges for the following tables (or to the tables upon which these names are defined as ALIASes, depending on how your DBA chooses to set up the zERT Network Analyzer database):
1.
SYSIBM_EZB_ZNADB.APPL
2.
SYSIBM_EZB_ZNADB.DATAMGMTHISTORY
3.
SYSIBM_EZB_ZNADB.DATASET
4.
SYSIBM_EZB_ZNADB.SECURITY_SESSION
5.
SYSIBM_EZB_ZNADB.SESSION_STATISTICS
6.
SYSIBM_EZB_ZNADB.IPSEC_INFO
7.
SYSIBM_EZB_ZNADB.SSH_INFO
8.
SYSIBM_EZB_ZNADB.TLS_INFO
9.
SYSIBM_EZB_ZNADB.TOPOLOGY
10.
SYSIBM_EZB_ZNADB.OPENJPA_SEQUENCE_TABLE
11.
SYSIBM_EZB_ZNADB.QUERY
12.
SYSIBM_EZB_ZNADB.SCOPE_FLTR
13.
SYSIBM_EZB_ZNADB.SCOPE_FLTR_ENDPT
14.
SYSIBM_EZB_ZNADB.SCOPE_FLTR_SYSSPEC
15.
SYSIBM_EZB_ZNADB.SEC_FLTR
16.
SYSIBM_EZB_ZNADB.SEC_IPSEC_FLTR
17.
SYSIBM_EZB_ZNADB.SEC_SSH_FLTR
18.
SYSIBM_EZB_ZNADB.SEC_TLS_FLTR
19. FILTEREDSECURITYSESSIONIDS
20. TCPSERVER_SUMMARIES
21. TCPCLIENT_SUMMARIES
22. EEPEER_SUMMARIES
23. TCPSERVER_CLIENTDETAILS
24. TCPCLIENT_CLIENTDETAILS
25. EEPEER_CLIENTDETAILS
26. TCPSERVER_CLEARSECURITYSESSIONDETAILS
27. TCPSERVER_IPSECSECURITYSESSIONDETAILS
28. TCPSERVER_SSHSECURITYSESSIONDETAILS
29. TCPSERVER_TLSSECURITYSESSIONDETAILS
30. TCPCLIENT_CLEARSECURITYSESSIONDETAILS
31. TCPCLIENT_IPSECSECURITYSESSIONDETAILS
32. TCPCLIENT_SSHSECURITYSESSIONDETAILS
33. TCPCLIENT_TLSSECURITYSESSIONDETAILS
34. EEPEER_CLEARSECURITYSESSIONDETAILS
35. EEPEER_IPSECSECURITYSESSIONDETAILS
----------------------------------------------------------------------------------------------------------------------------------
About the authors
Chris Meyer is the network security architect for z/OS and an IBM senior technical staff member.
Joshua Bennetone is the lead developer for the zERT Network Analyzer.
Copyright 2024 IBM Z and LinuxONE Community. All rights reserved.
Powered by Higher Logic
×
Group Tags
Add a tag
x
User Tags may not contain the following characters: @ # $ & :