Implementing distributed access at the central server
To enable distributed access to sensitive employee data, the Spiffy security plan requires certain security measures to be implemented at the central server location.
About this task
The following actions must occur at the central server location:
- The central Db2 subsystem must authenticate every incoming ID with RACF®.
- For SNA connections, the Spiffy security planners must include
an entry in table SYSIBM.LUNAMES in the CDB; the entry in the LUNAME
column identifies the LU name of every remote location. The entry
must specify that connections must be verified. Example: The following table shows an entry in SYSIBM.LUNAMES for LUREMOTE.The value of V for SECURITY_IN indicates that incoming remote connections must include verification. The value of N for ENCRYPTPSWDS indicates that passwords are not in internal RACF encrypted format.
Table 1. The SYSIBM.LUNAMES table at the central location LUNAME USERNAMES SECURITY_IN ENCRYPTPSWDS LUREMOTE blank V N The security plan treats all remote locations alike, so it does not require encrypted passwords. The option to require encrypted passwords is available only between two Db2 subsystems that use SNA connections.
- For TCP/IP connections, the Spiffy security planners must set the TCP/IP ALREADY VERIFIED field of installation panel DSNTIP5 to NO. This setting ensures that the incoming requests that use TCP/IP are not accepted without authentication.
- The Spiffy security planners must grant all privileges and authorities that are required by the manager of Department D11 to the ID, MGRD11. The security planners must grant similar privileges to IDs that correspond to the remaining managers.