SPI commands that can be audited
Some system programming interface commands can be audited.
The system programming interface commands SET, PERFORM, ENABLE, DISABLE, RESYNC can change resource definitions dynamically. An incorrect entry can cause the CICS® system to fail. When diagnosing a problem, it is important to know whether resources were changed.
System administrators and anyone who manages audit records can audit certain system programming
interface commands which dynamically change system resources. When a system resource is changed by
one of the audited system programming interface commands, a new message DFHAP1900
is written to a transient data queue CADS. The CADS transient data
queue is an indirect queue defined in the DFHDCTG group which is part of DFHLIST. The messages are
written in a human readable form.
- Time
- Application id
- Netname
- Transaction identification
- User ID
- Details of the command, including attribute name and value
- RESP response code
- RESP2 response code
DFHAP1900 I 11/11/2011 11:11:11 IYK3ZC76 IYCWTC99 CNTEST7 CEMT SET SYSTEM MAXTASKS(250) RESP(NORMAL) RESP2(0)Example 2: The command CECI SET FILE(TEMP) OPEN is entered from terminal TC99. The response is: Open/close failed EIBRESP=+0000000012 EIBRESP2=+0000000018. The audit message is written as:
DFHAP1900 I 11/11/2011 11:11:11 IYK3ZC76 IYCWTC99 CNTEST7 CECI SET FILE(TEMP) OPEN RESP(FILENOTFOUND) RESP2(18)
Where possible, the CVDA value is used in the message instead of the code to improve the readability of the audit messages.
DFHAP1900 I 11/11/2011 11:11:11 IYK3ZC76 IYCWTC99 CNTEST7 CECI SET FILE(TEMP) ENABLESTATUS(ENABLED) RESP(FILENOTFOUND) RESP2(18)
When you use CEMT, WUI or Explorer operator commands with generic parameters, each command is audited as if it was entered separately. For example, if you have 2000 programs and enter the command CEMT SET PROGRAM(*) ENABLE, 2000 separate messages are logged. Similarly, if you enter the command CEMT SET PROGRAM(*) NEWCOPY when you are not authorized for SET PROGRAM, 2000 RACF® failure messages are logged. So many messages could flood the CSSL queue so audit messages should be redirected to another queue. As each command is logged as if it were entered separately, you can search the log for a single program name to aid problem determination.
When you use CEMT or CECI commands, some options may be added or changed. The audit message shows the command that was issued, which may be different to the command you entered.
User IDs in audit messages
| EYUPARM in CMAS | SIT parm in CICS region where request is initiated | user ID in audit message |
|---|---|---|
| SEC(YES) | SEC=YES | Authenticated user ID |
| SEC(YES) | SEC=NO | Default user ID for CMAS |
| SEC(NO) | SEC=NO | Default user ID for CICS Region where command is issued |
| SEC(NO) | SEC=YES | Invalid combination |
authenticated user IDwill depend on how, and where, the request to issue the command was initiated, as illustrated in the following table:
| Where request is initiated | Authenticated user Id |
|---|---|
| WUI | User ID used to sign-on to the WUI |
| CICSPlex SM API Batch Job | Userid under which the Job connects to CICSPlex SM, by default this will be the user under which the job is run. |
| CICSPlex SM API Application | Userid under which the task connects to CICSPlex SM, by default this will be the user under which the task is running in the CICS. |
| Region Explorer (CMCI) | User ID specified in the Connection Credentials. |
For more information on CICS user security, see CICS users.
SPI commands that are not audited
- SET TERMINAL
- FEPI SET commands
- PERFORM SHUTDOWN (already handled by message DFHTM1715)
- CREATE (already recorded by existing messages)
When CICS starts auditing SPI commands
Auditing of the SPI commands starts after message DFHSI1517 is issued, indicating that control is given to CICS. When SPI auditing becomes available in the region, message DFHAP1901 is issued, indicating that it is active.
This means that during system initialization, SPI commands that are issued during PLT processing are not audited.