Correct; anything you use Contents Supervision on.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3

________________________________________
From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> on behalf of 
Joel C. Ewing <jcew...@acm.org>
Sent: Monday, February 18, 2019 4:48 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: RACF: Limiting update-authorization of a file to a particular 
application

And I forgot to mention, in addition to statically allocated STEPLIB,
for TSO/ISPF I believe you also need to include static ISPLLIB allocations.
    Joel C Ewing

On 2/18/19 11:37 AM, Seymour J Metz wrote:
> PADS was and is easy to get wrong, which is why I advised the OP to read the 
> documentation carefully. The rules apply not just to datasets in the JCL but 
> also to datasets that you allocate dynamically.
>
>
> --
> Shmuel (Seymour J.) Metz
> http://mason.gmu.edu/~smetz3
>
> ________________________________________
> From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> on behalf of 
> Joel C. Ewing <jcew...@acm.org>
> Sent: Sunday, February 17, 2019 5:43 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: [SPAM] Re: RACF: Limiting update-authorization of a file to a 
> particular application
>
> Unless things have changed, in order for RACF program-controlled dataset
> access to work, all programs loaded into the address space must be
> covered by a RACF PROGRAM profile.
> Typically one sets up a profile that will cover all modules in all
> system datasets that might be loaded in the TSO environment -- for example a
> PROGRAM ** profile with UACC(READ) with many group members of the form
> "datasetname//NOPADCHK"
> for each datasetname in the Linklist and each datasetname in the STEPLIB
> of installation-defined TSO logon PROCs from which a load module might
> be loaded into the TSO address space.   These must all be libraries that
> the normal TSO users cannot modify, as you are implicitly saying all the
> programs in all these libraries can be trusted to not do anything
> nefarious, so that when PROG1 opens the WHEN-restricted dataset, you
> don't have to worry that you might also be allowing one of the  other
> programs also in memory that shouldn't have access to that dataset to
> have access.  Note that the PROGRAM ** profile must be appropriately
> modified whenever the names of datasets in link list or STEPLIBs in TSO
> logon procs change.
>
> I think you may then have to also set up a specific PROGRAM profile for
> "PROG1" as well, but it would only need a group member for the actual
> dataset that contains PROG1
>
> RACF PROGRAM profiles are kept in memory, so any changes to PROGRAM
> profiles requires a RACF REFRESH  before changes take effect.
>
> If a TSO user explicitly loads a program from one of his own libraries
> so that it is not covered by a PROGRAM profile, that will break the
> program-controlled environment (and you want it to), and the user will
> have to logoff and logon to restore a program-controlled environment.
>
> Putting PROG1 in the AUTHPGM list for TSO says it may run "authorized"
> and use restricted and dangerous Operating System functions (is this
> something you really want for a COBOL program?) and has nothing to do
> with whether a program-controlled environment for RACF
> Program-Controlled dataset access is maintained.
>     Joel C. Ewing
>
> On 2/17/19 10:05 AM, Steff Gladstone wrote:
>> Ok. We have been playing around with program control.    If PROG1 (a COBOL
>> program incidentally) is to be allowed exclusively to update file MY.FILE,
>> then we:
>>
>> 1. introduced PROG1 into the list of programs in AUTHPGM in member IKJEFT00
>> 2. Executed command RDEFINE for the file (and additionally for the LE
>> runtime libraries - not sure if necessary) and PERMIT 'MY.FILE'
>>  WHEN(PROGRAM(PROG1)).
>>
>> The results were:
>>
>> 1. Executing PGM=PROG1 in batch -> good results
>>
>> 2. Executing a REXX procedure under PGM=IKJEFT01 in batch  -> good results
>>     (when invoked either by CALL 'lib(PROG1)'  or SELECT PGM(PROG1)
>>
>> 3. Executing a REXX procedure in TSO foreground invoking program with
>> CALL 'lib(PROG1)'  ->  receives the following error:
>>
>> ISPS118L Service not invoked. A valid ISPF environment does not exist.
>>
>>
>> 4. Executing a REXX procedure in TSO foreground invoking program with
>> SELECT PGM(PROG1)   ->  receives the following error:
>>
>> IKJEFTSR interface error
>> Authorized program 'PROG1'.  Return code=20  Reason code=40.
>>
>> Current dialog statement:
>> SELECT PGM(PROG1)
>>
>> We gather that we are running into the "dirty bit" problem that has been
>> documented in various forums.   What can we do to get around this (we need
>> the program control feature under TSO foreground as well)?
>>
>> Thanks in advance,
>> Steff Gladstone
>>
>> On Thu, 7 Feb 2019 at 18:06, Seymour J Metz <sme...@gmu.edu> wrote:
>>
>>> Program control, but pay close attention to the restrictions.
>>>
>>>
>>> --
>>> Shmuel (Seymour J.) Metz
>>> http://mason.gmu.edu/~smetz3
>>>
>>> ________________________________________
>>> From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> on behalf
>>> of Steff Gladstone <steff.gladst...@gmail.com>
>>> Sent: Thursday, February 7, 2019 6:37 AM
>>> To: IBM-MAIN@LISTSERV.UA.EDU
>>> Subject: RACF: Limiting update-authorization of a file to a particular
>>> application
>>>
>>> Greetings,
>>>
>>>
>>>
>>> We have an TSO application for end-users that allows them to update certain
>>> VSAM and PDS files.  In order for them to update these files we of course
>>> have to give their users update-authorization under RACF for those files.
>>>
>>>
>>>
>>> We want to limit their ability to update the files only via the particular
>>> TSO application (or via a particular I/O routine used by the application)
>>> and not via any other application program or IBM utility (e.g., IEBCOPY,
>>> ISPF on-line edit or utilities, etc.).
>>>
>>>
>>>
>>> How can we define the RACF authorizations in such a way as to limit the
>>> end-users'  update capabilities to the application (or to a particular I/O
>>> routine) alone?   Would the same (or similar) definitions work for a site
>>> using Top Secret instead of RACF?
>>>
>>>
>>>
>>> Thank you in advance,
>>> Steff Gladstone
>>>
> --
> Joel C. Ewing
>

--
Joel C. Ewing

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to