Creating input security metadata for security discovery analysis
A security administrator runs a JCL job to extract the RACF® definitions and convert them into input security metadata, which represents the security definitions for roles and transactions in an ESM agnostic format.
For an overview of the whole security discovery process, see How it works: CICS security discovery. This task is Step 1 in that flow.
Before you begin
To create the security metadata for each set of CICS® regions that share security definitions, make sure the regions have the same RACF class(es) and SECPRFX SIT parameter.
For more information about security metadata, see What is security metadata?. This task does not require you to back up the data.
Procedure
- The security administrator needs to customize the DFH$R2SM JCL, which is a sample in
hlq.SDFHSAMP. Customize the following parameters as needed:
- SECMETA EXEC DFHXSMET,SAMPLIB=hlq.SDFHSAMP
- The JCL uses REXX programs in the CICS sample library. On
this line, change
hlqto the installed library’s high-level qualifier. - DIR
- Specifies the directory to one on zFS into which the output file will be created. This directory must already exist.
- FN
- Specifies the file name of the output file. The file will be created in ASCII with a file extension of .esm.
- CYL
- Specifies the number of cylinders that allows for the size of the RACF data to be extracted. The default allows for two million lines of output, which is sufficient for most installations.
- Xnnn
- The name of the CICS classes as defined on the SIT
security class parameters (Xnnn), for example,
XTRAN=CICSTRN,XFCT=CICSFCT.The transaction classes are always required. IfXTRAN=NOis specified in the JCL, an error is returned:ERROR: XTRAN is not supported and terminates with Return code 12
For other classes, Xnnn=NO is assumed unless the option is otherwise specified.
- SECPRFX
- The security prefix as defined on the SECPRFX SIT parameter.
- HIDE
- Obfuscates the output if you need to send it to IBM® for
diagnostic purposes. Set it to
NOfor customer use. - DEBUG
- Use it for diagnostic purposes if you need IBM support.
Set it to
NOfor customer use.
- The job needs to be submitted by the security administrator who has at least ROAUDIT authority
so that the RACF commands extract all of the transaction and
group data.
The security metadata looks like the following example:
Figure 1. An example of generated security metadata --- # Security Metadata--- version: 2 file_created: - date: "17 Mar 2023" - time: "15:27:26" - user: SUE - esm: "RACF" group_list: - name: MANAGER users: - MAINWRN user_list: - user: MAINWRN username: "George Mainwaring" secprfx: NO classes: - class: XTRAN name: CICSTRN profiles: - name: MENU access_lists: - access: READ groups: - MANAGER - Job steps return a completion code:
- 0 - successful completion
- 4 - warning messages issued (the job will continue)
- 8, 12 - error messages issued (the job will terminate)
- Each job step might result in messages being issued to SYSTSPRT. Warning messages are issued for unsupported definitions as these definitions cannot be processed by the conversion programs.
Result
The security metadata is generated in ASCII on zFS.
What to do next
The security administrator passes the security metadata to the system programmer for analysis in CICS Explorer®. For instructions, see Analyzing security definitions using security discovery in CICS Explorer.
6.2 and later Optionally, the system programmer can capture security discovery data (SDD) as additional input data for analysis in CICS Explorer.