Security class holding FEK.** profiles. For more information, see Push-to-client developer groups and Altering client functions.
Deny users to save their host password on the client. For more information, see "Defining extra Java™ startup parameters with _RSE_JAVAOPTS" in the Host Configuration Guide (SC27-8437).
Deny users access to z/OS® UNIX. For more information, see "Defining extra Java startup parameters with _RSE_JAVAOPTS" in the Host Configuration Guide (SC27-8437).
Timer to disconnect idle clients. For more information, see "Defining extra Java startup parameters with _RSE_JAVAOPTS" in the Host Configuration Guide (SC27-8437).
Application ID used for PassTicket creation/validation. For more information, see Using PassTickets.
Enable Port Of Entry checking. For more information, see Port Of Entry (POE) checking.
Use your security product to authenticate users with an X.509 certificate. For more information, see Client authentication using X.509 certificates.
GSK_LDAP_SERVER=*
GSK_LDAP_PORT={389 | *}
GSK_LDAP_USER=*
GSK_LDAP_PASSWORD=*
Additional security checks for X.509 authentication. For more information, see (Optional) Query a Certificate Revocation List (CRL).
GSK_PROTOCOL_SSLV3={ON | OFF}
GSK_PROTOCOL_TLSV1={ON | OFF}
GSK_PROTOCOL_TLSV1_1={ON | OFF}
GSK_PROTOCOL_TLSV1_2={ON | OFF}
Protocol selection for
encrypted communication. For more information, see Managing encryption protocols.GSK_V3_CIPHER_SPECS=*
Cipher selection
for encrypted communication. For more information, see Managing encryption ciphers.Use FIPS 140-2 compliant encrypted communication. For more information, see (Optional) Enable FIPS 140-2 compliancy.
File access permission mask of the host log files and directories.
Additional security checks (like ownership) for host log files and directories.
Path leading to the audit log files. For more information, see Audit logging.
File access permission mask of the audit log files. For more information, see Audit logging.
(_RSE_JAVAOPTS) -Daudit.action.id=<userid>
z/OS UNIX based user exit that processes audit logs. For more information, see Audit logging.