On 8/11/2005 8:41 AM, Thomas Conley wrote:
Not really doable.  Hundreds of automation execs broadcast commands
throughout the system, and the client can't afford not to route the commands
(minor things like varying tape drives offline and online, no big deal ;-)
I would strongly suggest that you come up with a way to deal with the
FRACINT abends so that you can support ACF2 to RACF conversions (that is in
IBM's best interest, is it not?)

Unfortunately, the processing of operator commands requires that -no- I/O take place during the authorization checking. If I/O can occur, then there are cases during error recovery where the authorization check will hang, leading to the command not functioning, which then leads to error recovery being impossible.

Therefore, unless ACF2 could provide a complete ACEE, in the exact format that RACF uses, we cannot satisfy that requirement. And they cannot do that, due to the way they handle groups (for one) and due to the fact that RACF has some proprietary data in an ACEE extension that
(a) we do not disclose to the other vendors and
(b) they probably could not support/duplicate even if we told them the format.

At one point we did do some experiments where we said, OK, so we can't do any I/O, but maybe we could take the ACEE that ACF2 sends us (or the UTOKEN that should also come across the interface) and build a phony ACEE without doing any I/O. It could have the user ID, and perhaps have the "current" connect group, but it would lack any of the user's other groups.

Lacking the complete group list, some commands might fail (for example, if the administrator had used one of those alternate groups to grant authority via the permissions in an OPERCMDS profile) but this would avoid the abend, and perhaps the administrators would accept having to administer things differently for this case.

Unfortunately, we discovered that the ACEE/UTOKEN we were receiving from ACF2 did not even have sufficient information to do that, so the experiment failed. And we are busy enough with other things that we have not continued experimenting.

Thus, at this point (and for the foreseeable future) we have no solution for your problem. In a sysplex with a mix of security products, operator command security will fail, with an abend, if an ACF2 (or Top Secret, probably) system sends a command to a RACF system.

        Walt Farrell, CISSP
        z/OS Security Design, IBM

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to