[Default] On 27 Jul 2020 13:40:48 -0700, in bit.listserv.ibm-main
stars...@mindspring.com (Lizette Koehler) wrote:

>First if you have not done so, you might want to join the CICS or RACF
>Lists.  

While I am at least 20 years out of date, it used to be that someone
had to be set up in each CICS region they were allowed to access.  So
far as I know access to TSO does not automatically get you access to
CICS and having access to CICS test does not mean access to CICS
production or even CICS test for a different region.  

Clark Morris 
>
>I think the IRR profiles can avoid the use of SPECIAL and OPERATIONS, but
>you would need to research that
>
>
>I think the RACF List may be more helpful
>
>CICS   http://www.listserv.uga.edu/archives/cics-l.html
>RACF   http://www.listserv.uga.edu/archives/racf-l.html
>
>
>Next I think here are IRR profiles that can be used to reset passwords.  I
>am not very familiar with it, I think this
>
>https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.1.0/com.ibm.zos.v2r1
>.icha700/icha700_Steps_for_delegating_the_authority_to_reset_passwords_by_gr
>oup_tree.htm
>
>
>Steps for delegating the authority to reset passwords by group tree
>
>Before you begin:
>
>    Make sure the ALTUSER command issuer does not have similar access to the
>IRR.PASSWORD.RESET resource in the FACILITY class.
>    Ensure that list-of-groups-checking (SETROPTS GRPLIST) is enabled.
>
>Perform the following steps to limit the authority of a general user or
>group to resume user IDs and reset passwords and password phrases based on
>the scope of a group tree.
>
>    Define the following generic profiles in the FACILITY class, if not
>already defined. Doing so ensures that an existing generic profile does not
>inadvertently prevent you from successfully limiting this authority.
>    Example:
>
>    RDEFINE FACILITY IRR.PASSWORD.RESET.**  UACC(NONE)
>    RDEFINE FACILITY IRR.PWRESET.**         UACC(NONE)
>    RDEFINE FACILITY IRR.PWRESET.EXCLUDE.** UACC(READ)
>
>    If you use UPDATE or CONTROL access for any IRR.PWRESET profile, as
>described in Table 1, specify the higher level (UPDATE or CONTROL) with the
>UACC operand for the IRR.PWRESET.EXCLUDE.** profile instead of the
>UACC(READ) option shown in this example.
>    Define a profile to protect the IRR.PWRESET.TREE.owner resource in the
>FACILITY class, where owner is the group that is at the top of a group tree.
>    Example:
>
>    RDEFINE FACILITY IRR.PWRESET.TREE.GROUP1 UACC(NONE)
>       AUDIT(FAILURES(NONE) SUCCESSES(READ))
>
>
>https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.1.0/com.ibm.zos.v2r1
>.icha700/icha700_Steps_for_delegating_the_authority_to_reset_the_password_fo
>r_any_user.htm
>
>Steps for delegating the authority to reset the password for any user
>Perform the following steps to authorize a general user or group to use the
>ALTUSER command to resume a revoked user or reset a user's password or
>password phrase.
>
>    Define a profile to protect the IRR.PASSWORD.RESET resource in the
>FACILITY class.
>    Example:
>
>    RDEFINE FACILITY IRR.PASSWORD.RESET UACC(NONE)
>       AUDIT(FAILURES(NONE) SUCCESSES(READ))
>
>    ______________________________________________________________________
>    Authorize the general users or groups.
>    Example:
>
>    PERMIT IRR.PASSWORD.RESET CLASS(FACILITY) ID(HELPDESK USER19)
>ACCESS(READ) 
>
>    See Levels of authority for restrictions and details about authority
>based on the access level to IRR.PASSWORD.RESET.
>
>    ______________________________________________________________________
>    Activate the FACILITY class if not already active.
>    Example:
>
>    SETROPTS CLASSACT(FACILITY) 
>
>    If the FACILITY class is already active and RACLISTed, refresh the
>FACILITY class profiles.
>
>    SETROPTS RACLIST(FACILITY) REFRESH
>
>    ______________________________________________________________________
>
>You have now authorized a general user or group to use the ALTUSER command
>to resume the user ID or reset the password or password phrase for any user,
>excluding protected users and users with the SPECIAL, OPERATION, or AUDITOR
>attribute.
>
>
>-----Original Message-----
>From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> On Behalf Of
>McCabe, Ron
>Sent: Monday, July 27, 2020 1:32 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: Keeping TSO users our of CICS
>
>Hello IBM Listers,
>
>Got an interesting problem that I would like to know how we can avoid.  Our
>Help Desk users TSO accounts have the SPECIAL ATTRIBUTE so they can reset
>passwords and define new users.  These TSO accounts are not defined to CICS
>but every once in awhile one of them will try to login to CICS using their
>TSO account and after messing up their password 3 times the system puts out
>an ICH302D message asking if we want to REVOKE them or let them try again
>(we REVOKE), this message waits for a reply and while it is waiting CICS
>hangs until a reply is given.  We thought about defining their TSO accounts
>to CICS but that does not help if they actually do mess up their password.
>We thought we could do it with RACF but RACF doesn't check any authorization
>until "after" the user successfully signs on so we would still get the
>ICH302D message.
>
>Does anyone else run into this problem?  Is there a way we can get around
>this problem?  We thought about having MSGTABLE do an automated response but
>there could be times when we don't want to have the user REVOKED.
>
>Thanks,
>Ron McCabe
>Manager of Mainframe/Midrange Systems
>Mutual of Enumclaw
>
>
>Confidentiality Notice: This e- mail and all attachments may contain
>CONFIDENTIAL information and are meant solely for the intended recipient. It
>may contain controlled, privileged, or proprietary information that is
>protected under applicable law and shall not be disclosed to any
>unauthorized third party. If you are not the intended recipient, you are
>hereby notified that any unauthorized review, action, disclosure,
>distribution, or reproduction of any information contained in this e- mail
>and any attachments is strictly PROHIBITED. If you received this e- mail in
>error, please reply to the sender immediately stating that this transmission
>was misdirected, and delete or destroy all electronic and paper copies of
>this e-mail and attachments without disclosing the contents. This e- mail
>does not grant or assign rights of ownership in the proprietary subject
>matter herein, nor shall it be construed as a joint venture, partnership,
>teaming agreement, or any other formal business relationship.
>
>----------------------------------------------------------------------
>For IBM-MAIN subscribe / signoff / archive access instructions, send email
>to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
>----------------------------------------------------------------------
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to