PRODSECURITY parameter group
| Parameter name | Parameter description | Default value | Update | Output only |
|---|---|---|---|---|
| ALLOWUNPROT | ALLOW ACCESS TO UNPROTECTED RESOURCES Specifies how Data Virtualization will deal with
unprotected resources. When set to |
NO | Yes | No |
| AUTOSUPPLYVOLSER | AUTOMATICALLY SUPPLY VOLSER FOR SDBECURE API If set to Note: The system
never attempts to supply a VOLSER for API requests which are issued while running in a cross-memory
environment. (Certain types of SEF ATH rules operate in cross-memory mode.) Also, the VOLSER is not
supplied if the data set has been migrated to offline storage by DFHSM or other space management
product.
|
YES | Yes | No |
| BYPASSSEF | BYPASS SEF FOR RECONNECT PROCESSING Controls whether SEF are invoked when a client reconnects to the Data Virtualization Server. This is a performance enhancement used to speed up processing when an ODBC client reconnects to the server. This is important if VCF is in use. This parameter cannot be changed after product initialization because of security restrictions. |
NO | No | No |
| CENSORAPIDATAVALUES | CENSOR VARIOUS API DATA VALUES Indicates whether display of various API data is restricted
to authorized users. If set to |
NO | Yes | No |
| CENSORHTTPRESP | CENSOR HTTP RESPONSE OUTPUT Indicates whether display of out-bound response data are
restricted to authorized users. If set to |
NO | Yes | No |
| CENSORSSLAPIDATAVALS | CENSOR SSL VARIOUS API DATA VALUES Indicates whether display of various API data for SSL
sessions are restricted to authorized users. If set to |
NO | Yes | No |
| CENSORSSLAUTHDATA | CENSOR SSL AUTHORIZATION HTTP HEADER DATA Indicates whether display of inbound
authorization data for SSL sessions are restricted to authorized users. If set to
|
YES | Yes | No |
| CENSORSSLHTTPRESP | CENSOR SSL HTTP RESPONSE OUTPUT Indicates whether display of outbound response data for SSL
sessions are restricted to authorized users. If set to |
NO | Yes | No |
| CENSORSSLQUERYDATA | CENSOR SSL URL QUERY DATA Indicates whether display of inbound URL query data for SSL
sessions are restricted to authorized users. If set to |
NO | Yes | No |
| CENSORTRACEWRITES | CENSOR ALL TRACE WRITES If set to |
YES | Yes | No |
| CENSORURLAUTHDATA | CENSOR AUTHORIZATION HTTP HEADER DATA Indicates whether display of in-bound authorization
data are restricted to authorized users. If set to |
YES | Yes | No |
| CENSORURLQUERYDATA | CENSOR URL QUERY DATA Indicates whether display of inbound URL query data are restricted to
authorized users. If set to |
NO | Yes | No |
| CENSORWSAUTHDATA | CENSOR WEB SERVICE AUTHORIZATION DATA Indicates whether display of in-bound Web Service
authentication data are restricted to authorized users. If set to |
NO | Yes | No |
| CLIENTLOGON | CLIENTS CAN BE AUTHENTICATED BY NOS | NO | Yes | No |
| CLIENTLOGONLOGOPT | NORMAL CLIENT LOGON RACF LOG= OPTION If set to |
ASIS | Yes | No |
| CLIENTLOGONSTATOPT | NORMAL CLIENT LOGON RACF STAT= OPTION If set to |
ASIS | Yes | No |
| DISABLEFASTAUTH | DISABLE FASTAUTH SECURITY CHECKS The DISABLEFASTAUTH parameter
disables the use of |
Yes | Yes | No |
| DRIVERSYSPLEXAUTH | DRIVER SYSPLEX AUTHENTICATION Allows IOCTL access to collect USERID and UTOKEN information about driver connections when the driver and the server are executing in the same SYSPLEX environment. This will allow driver clients on the same SYSPLEX to choose to use the active z/OS authentication, by not providing the USERID and PASSWORD. When a USERID and a PASSWORD or other authentication are provided, the supplied credentials take priority over active client driver SYSPLEX authentication for the current TCP/IP connection. |
NO | Yes | No |
| EXPIRESECOPTENTRIES | EXPIRE USER SECURITY CACHE ENTRIES Causes all SOM cache entries on this Data Virtualization Server to be marked expired. This produces a processing delay for the next remote support task that performs a logon or logoff. |
NO | Yes | No |
| EXPOSEWWWPASSWORD | EXPOSE CLEAR-TEXT PASSWORD IN WWW.PASSWORD Controls whether client passwords provided by
the HTTP request Authorization: header are instantiated in clear text form as the runtime variable
WWW.PASSWORD. The default setting Note: WWW.PASSWORD is built only across the
password sent via browser userid/password prompting and is not set for any other passwords processed
by the system
|
NO | Yes | No |
| GETLOGONMESSAGES | GET ALL SAF LOGON MESSAGES Controls whether all of the messages from SAF LOGON processing
should be obtained. If set to |
NO | Yes | No |
| HEXIPSOURCE | USE HEXADECIMAL IP ADDRESS AS SOURCE Indicates that the SOURCE for SAF calls are set to the hexadecimal form of the IP address for clients connected using TCP/IP. This flag only applies to TCP/IP connections. The four-byte binary IP address is converted to an eight-byte upper case hexadecimal string. This string is used as the SOURCE for SAF calls. The SOURCE is where the SAF request is presumed to have come from. This used to mean terminal name and now has other meanings as well. |
NO | No | No |
| HFSAUTHMODE | HFS AUTHORIZATION OPERATING MODE Determines how security authorization processing is performed when serving HFS-resident files. HFSAUTHMODE(GLOBAL) specifies that ALL accesses to any HFS-resident file or directory paths are made using the authorizations granted to the Server’s default Runtime userid (the Userid specified by the WWWDEFAULTRUNAUTH parameter). The Server switches to this Userid before any access to an HFS-resident file is made and restores the pre-existing security environment after each access. HFSAUTHMODE(THREAD) specifies that all accesses to any HFS-resident file or directory paths are made using the authorizations granted to the transaction thread userid. Note: HFSAUTHMODE(THREAD) is the preferred operational mode,
however, the default is HFSAUTHMODE(GLOBAL) to maintain compatibility with
previous releases of the product.
|
GLOBAL | No | No |
| IDFALREADYVERIFIED | IDF ALREADY-VERIFIED SECURITY REQUIRED Specifies the minimum authentication level that can be used when a client connects to the IDF DRDA Application Server. YES- Indicates that userid-only logons are supported with authentication already performed by the connecting DRDA client requestor. NO (DEFAULT VALUE) - Indicates that both a userid and a password or other supported authentication mechanism is required and will be verified by IDF. |
No | Yes | No |
| KERBEROSACTIVATE | KERBEROS FLAG ACTIVATE Activates the Kerberos Security API for the server. The default
value is Note:
If the server is active, this option should only be modified under direct supervision of a product support specialist. Use of the xVZyIN00 PARAM is the preferred method to modify the server PARAM. If the Kerberos API LOAD module cannot be LOADED, Kerberos support will be deactivated for the active Server execution, and KERBEROSACTIVATE will be reset to a value of NO. |
No | Yes | No |
| KERBEROSACTIVATE | KERBEROS FLAG ACTIVATE Activates Kerberos Security API for the server. Setting this parameter allows Kerberos Secured Object processing to occur. The Kerberos Server DAEMON will be accessed to verify Kerberos configuration. The Kerberos API LOAD module will be loaded from STEPLIB to perform initialization of Kerberos API. Once the necessary steps are completed, the active server will process Kerberos security requests. If the DAEMON is not active, the server will continue to attempt to contact with the Kerberos Server DAEMON on every secured object request until the DAEMON becomes active. Kerberos Token or Ticket Object processing will not be available until the DAEMON is fully initialized. All Kerberos Secured Object processing will fail with security errors until the value of KERBEROSAPIACTIVE is set to YES. In addition, other information Kerberos settings will not be updated until the Kerberos API is active and the configuration is verified. Use the xVZyIN00 PARAM to modify this parameter. Note:
This parameter should only be modified under direct supervision of a product support specialist, once the Server is active. If the Kerberos API LOAD module cannot be loaded, Kerberos support will be deactivated for active Server execution and KERBEROSACTIVATE parameter will be reset to a value of NO. |
NO | YES | NO |
| KERBEROSAPIVERS | KERBEROS API VERSION/BUILD Specifies the Kerberos API Version/Build information collected after initialization of Kerberos API. This option is Server modified and informational only. |
NO | YES | |
| KERBEROSCLIENTONLY | IN-BOUND KERBEROS CLIENT ONLY Allows only Kerberos authentication when this parameter is set to Yes. If this parameter is set to No, the Server will allow both legacy z/OS USERID/PASSWORD authentication and Kerberos authentication. The value of No allows a transition from legacy z/OS USERID/PASSWORD authentication to Kerberos. |
YES | NO | |
| KERBEROSCLIENTS | KERBEROS IN-BOUND CLIENTS SUPPORTED Allows Kerberos authentication when the parameter is set to Yes. if the parameter is set to No, the server will not activate inbound Kerberos client authentication. |
Yes | No | |
| KERBEROSCLIENTSPN | KERBEROS CLIENT SPN ALIAS This parameter is an optional parameter that needs the supplied
SPN Alias be defined in the Kerberos DAEMON configuration. If the SPN verification fails, Kerberos
processing is halted. And the Kerberos ticket will not be available.
KERBEROSFAILED value will bet set to
YES. This option allows
Kerberos to be revoked from a server process by removing the SPN. This option can be modified after
server initialization. Note: Even after verification, a secondary verification will occur due to the
fact that the Kerberos DAEMON requires a follow-up verification of the configuration. This secondary
verification scenario occurs normally after a restart or any authentication
time-out.
|
Yes | No | |
| KERBEROSDAEMONSPN | KERBEROS DAEMON SPN ALIAS This optional parameter verifies the Kerberos DAEMON SPN Alias after the server verifies the DAEMON SPN against the value supplied. If the supplied Alias is valid, processing will continue. If the supplied Alias is invalid, Kerberos Security will be disabled and all Ticket/Token Object request will fail. The default value for this parameter is an empty string of blanks/nulls to allow the server to discover the DAEMON SPN value, provided that the optional value informs the Server to verify the DAEMON SPN Alias. Note: Modification to this
parameter will not become active until the Kerberos DAEMON is refreshed or the DAEMON requests the
active server security credentials to be re-verified.
|
Yes | No | |
| KERBEROSDAEMONV | KERBEROS DAEMON VERSION / BUILD Enables collection of Kerberos DAEMON Version/Build information from the DAEMON server during Kerberos configuration process. |
No | Yes | |
| KERBEROSDSCLIENT | TYPE(SERVER) OUT/IN BOUND KERBEROS If this parameter is set to |
Yes | No | |
| KERBEROSECHOSPN | KERBEROS SERVER ECHO SPN 2 CLIENT When a client attempts to authentication with a SPN which
is rejected by the Server:
|
Yes | No | |
| KERBEROSFAILED | KERBEROS FLAG FAILURE This option is set only when the KERBEROSACTIVATE
parameter is set to This parameter value is
set to |
Yes | No | |
| KERBEROSGRANDE | KERBEROS FLAG GRANDE This option is set to This option remains as
|
No | Yes | |
| KERBEROSHOST | KERBEROS HOST IPADDRESS/DOMAIN Provides the host ip address/domain of Kerberos ticket server DAEMON. The default value of this parameter is 127.0.0.1. |
No | No | |
| KERBEROSLOAD | KERBEROS API LOAD MODULE NAME Provides the Kerberos API LOAD module name that processes Kerberos ticket object requests for the active server. |
No | No | |
| KERBEROSMAXTICKET | KERBEROS API MAX TICKET/TOKEN SIZE Specifies the maximum size of Kerberos ticket/token objects. The value of the default maximum is 1024*2 or 2K. Setting the value may reduce storage requirements when Kerberos Ticket/Token Objects are much smaller than the system default |
|||
| KERBEROSPORT | KERBEROS DAEMON PORT NUMBER Provides the port number used to access the Kerberos ticket server DAEMON. |
5628 | NO | NO |
| KERBEROSTIMEOUT | KERBEROS API TIME OUT Defines an override of the standard Kerberos API TCP/IP time out value. The default value of -1 indicates no override of API TCPIP timeout is required. Setting the value to 0 will negate timeout processing. The range of values for this parameter is from 0 to 120. |
-1 | YES | NO |
| KERBEROSTRACE | KERBEROS API TRACE VALUE Defines the type of traces Kerberos processing will create during execution of Kerberos requests. The default value of -1 indicates quiet tracing with 0 through 6 providing an increasing level of trace from 0 failures to 6 debug. |
-1 | YES | NO |
| MAXSECURITYMSGRATE | MAX SUPPRESS MSG RATE FOR RESOURCE CHECKS Set the MAXSECURITYMSGRATE
to zeroes to turn off message suppression rate for RACF resource checking in the product. If
non-zero, and SECURITYMSGSUPP is set to |
Yes | No | |
| PASSEMPTYGROUPNAME | PASS EMPTY GROUP NAME TO RACROUTE Specifies whether a SAF-based RACROUTE REQUEST=VERIFY call passes a NULL group name on the request. Passing a NULL group name allows a user-written SAF exit routine, such as ICHRTX00, to manipulate the group name, even though Data Virtualization does not furnish or otherwise process RACF-type group names. |
NO | Yes | No |
| PASSIMSGROUPNAME | PASS SAF GROUP NAME TO IMS Specifies whether to pass the SAF group name to IMS. Passing the SAF group name in the PROFILE parameter allows the group name, associated with the USERID, to appear in the I/O PCB of the IMS transaction. |
NO | Yes | No |
| PASSTICKETAPPNAME | APPLICATION NAME FOR PTKTDATA PROFILES Specifies the 1 to 8-character application name to be used in PTKTDATA profiles. |
XDBY XXXX | No | No |
| PASSWORDCASE | USER PASSWORD CASE Specifies whether passwords are used exactly as received (ASIS) or should be translated to upper (UPPER) case. |
UPPER | No | No |
| PROVIDEPASSWORDS | PROVIDE PASSWORDS FOR LOGON RULES Controls whether passwords are provided to LOGON rules.
If this parameter is set to |
NO | No | No |
| PUBLISHJCADETAIL | PUBLISH J2CA DETAIL PROF Used when authorizing J2CA publishing of events. When set to
|
NO | Yes | No |
| RACFGROUPLIST | CHECK RACF GROUP LIST FLAG | NO | Yes | No |
| RECONNLOGONLOGOPT | RECONN CLIENT LOGON RACF LOG= OPTION If set to |
ASIS | Yes | No |
| RECONNLOGONSTATOPT | RECONN CLIENT LOGON RACF STAT= OPTION If set to |
ASIS | Yes | No |
| RESOURCETYPE | RESOURCE TYPE FOR RESOURCE RULES | NON | Yes | No |
| RULESETSEFAUTH | RULESET SEFAUTH() OVERRIDE Indicates whether the SEFAUTH() settings for individual rulesets are honored or overridden on a global basis. If NOOVERRIDE is set, each individual ruleset’s SEFAUTH() setting is honored. If NONE, READ, UPDATE, or ALL is set, all ruleset level SEFAUTH settings are ignored and this setting is used instead. The ruleset SEFAUTH() setting determines whether SEF directly checks each command request to see if the end user has MVS authorization to the underlying ruleset before performing an operation on behalf of the user. Examples of such operations are enabling a rule, setting a rule’s auto-enable flag, or putting a ruleset in offline status. Note that this checking is in addition to checking the end user’s authorization to use SEF facilities. The SEF facility check is always performed using the "SEF" resource in the Server’s resource class list. SEFAUTH specifies the level of operation that does not require authorization to proceed. A lower level of SEFAUTH means that less control is exerted over the operations on rules. |
NOOVERIDE | Yes | No |
| RULESETSEFAUTH | In increasing magnitude of authorization required, the options are:
|
NOOVERIDE | Yes | No |
| SECOPTRETAIN | SECURITY OPT RETENTION PERIOD Specifies the amount of time in seconds that a cached
security environment (ACEE) is to remain valid. When the time limit is reached, the cached security
environment is invalidated. A value of zero means that cache entries are retained indefinitely. The
default value is 28800 seconds (8 hours). This option only has meaning when the
SECURITYOPTIMIZATION option is set to |
28800 | Yes | No |
| SECOPTTARGET | SECURITY OPT CACHE TARGET ENTRIES Specifies the target number of user security environments
(ACEE) to keep in the user security cache. The value can be from 500 to 100,000. Note that this
target number increases if there are not enough available cache entries to maintain an entry for all
currently logged on users. This option only has meaning when the
SECURITYOPTIMIZATION option is set to |
5000 | No | No |
| SECOPTTHRESHINT | SECURITY OPT THRESHOLD CHECKING INTERVAL Specifies the interval, in seconds, that SOM cache
is scanned to find entries eligible for deletion from the cache. The interval value is specified in
seconds and should be a factor of one hour. In other words the value should divide evenly into 3600.
This option only has meaning when the SECURITYOPTIMIZATION option is set to
|
1200 | Yes | No |
| SECOPTTHRESHOLD | SECURITY OPT THRESHOLD VALUE Specifies the target number of SOM cache entries that are to be made available by SOM threshold interval processing, expressed as a percentage of the current number of allocated cache entries. The value can be from 5 to 100 percent. The default value is 25 percent. Specifying a small percent saves CPU time, but increases the number of expired, unused ACEEs that are kept in storage. Specifying a larger percent will reduce the number of expired and unused ACEEs kept in storage. |
25 | Yes | No |
| SECURITYMODE | SHARED SECURITY MODE Controls how security environments are shared. If this parameter is
set to |
NONE | No | No |
| SECURITYMSGSUPP | SUPPRESS MESSAGES FROM RESOURCE CHECKS If set to |
NO | Yes | No |
| SECURITYOPTIMIZATION | SECURITY OPTIMIZATION ENABLED Specifies whether Data Virtualization caches the security environments (ACEE) created for successful remote user logons. |
YES | No | No |
| SECURITYPACKAGE | SECURITY PRODUCT | RACF (depending on Security product) | No | Yes |
| SECURITYVERSION | SECURITY PRODUCT VERSION | 7.74 (depending on Security product) | No | Yes |
| SQLVTRESOURCETYPE | RESOURCE TYPE FOR SQL ACCESS TO VIRTUAL TABLES Contains the name of the security server's class (or resource type for ACF2) that is used to perform authorization checks for SQL access to meta data and virtual tables in the SQL engine. |
YES | NO | |
| SSL | SSL CONNECTIONS SUPPORTED If set to |
YES | No | No |
| SSLAUTODETECT | AUTO-DETECT SSL CONNECTIONS If set to Note: A separately configured SSL port accepts only SSL connections.
|
NO | No | No |
| SSLCLIENTAUTH | SSL CLIENT AUTHENTICATION The SSLCLIENTAUTH parameter activates optional SSL Client certificate processing in the Server, and also selects the means by which SSL Client certificates are authenticated when received. The values valid for this parameter are:
Configuration of SSL support for use in Data Virtualization Server requires that you designate the location of the certificate and key store that the IBM-supplied SSL components will use. The server's SSL support may be configured to use a pair of “native” IBM SSL key database and key stash files. These files are maintained by the GSKKYMAN utility; a part of the IBM System SSL component. Alternatively, SSL may be configured to rely upon RACF (or SAF) digital certificate support which utilizes a designated RACF keyring as the store for the information. The designation of a certificate/key store, and the active content of the store have special impacts upon client certificate processing; impacts not always discussed nor easily located in the available documentation |
NONE | No | No |
| SSLCLIENTAUTH | One important bearing this has upon client certificate handling is the number and type of
certificates present in the SSL database or keyring. During SSL session setup, the Server requests
that the client transmit its certificate, and sends a list of those issuing authorities it trusts as
acceptable. This list is built from the trusted CA certificates found in the SSL database or RACF
keyring. A client may possess a separate certificate issued and signed by each of the most secure and well-known CA signing authorities. However, if none of those CA certificates are defined as trusted within the active database or keyring, then none will be sent to the client as an acceptable signer. Such a scenario would result in a client finding no acceptable alternatives and failing to return any certificate. Be aware that client's may fail to transmit any certificate, precisely because the list of trusted signers, at the host, is incomplete or deliberately and selectively limited. The second impact that SSL key storage configuration values affect is the ability of the Server to “convert” a valid certificate into a client logon to the z/OS system. When a RACF keyring is used as the SSL database, client certificates may optionally be used to drive the Init_ACEE callable service. The service may be able, if properly configured, to “map” the certificate received to produce an associated RACF userid logon. “Conversion” of client digital certificates into a RACF client logon can only be done when the SSL configuration settings designate a RACF keyring for the SSL key store. |
NONE | No | No |
| SSLCLIENTNOCERT | ACTION IF SSL CLIENT PROVIDES NO CERTIFICATE This parameter is ignored unless SSL Client certificate processing is activated (SSLCLIENTAUTH). This parameter setting indicates the action to be taken if an SSL client fails to provide a valid x501 certificate during session establishment. Note that a Client's failure to provide a certificate may be due to the lack of mutually trusted signing authority. Lack of a certificate does not prevent the SSL session from being established and used. The following values can be coded, each designating the action taken if the condition occurs. Note: The SSL handshake at session establishment completes prior to
application of the FAILURE action
If set to If set to
|
ALLOW | No | No |
| SSLINITIALIZED | SSL SUPPORT HAS BEEN INITIALIZED Displays |
NO | No | Yes |
| SSLUSERID | SSL RESOURCE MANAGER TASK USERID Specifies a highly-privileged userid under which the SSL resource manager subtask operates. If not specified, the SSL resource manager operates using the subsystem's address-space-level userid. This userid must be authorized to open and read the SSL Private Key and Certificate files. Use of a separate userid for this task prevents other transaction subtasks, and prevents the server from accessing this highly confidential information. |
NULL | No | No |
| STANDARDUSERID | DEFAULT RUNAUTH USERID Specifies the MVS userid under which all work is run. The userid
specified is made the effective userid for Web transactions unless WWW rules override this value. If
the parameter is set to |
NONE | No | No |
| STREAMSJCADETAIL | FORCE DETAILED PROFILES FOR J2CA Causes the usage of detailed security profiles while authorizing a J2CA user to monitor changes to tables. Detailed profiles are in the form PUBLISHJ2CA.source.tablename. |
YES | NO | |
| TERMINATESECOPT | TERMINATE SECURITY OPTIMIZATION Causes SOM to terminate. If set to |
NO | Yes | No |
| TLSDYNAMICUSERIDS | IMPLEMENT DYNAMIC USERIDS FOR TLS Controls whether the generic userids supplied by a TLS-enabled connection are made active prior to most operations in Data Virtualization. The SEF logon rule sets the TLS-enabled option and this option determines if the supplied generic userid is used for RPC invocations, DB2 threads (only for RRSAF), CICS transactions, and so on. |
YES | No | No |
| UNCENSORZOOMONLY | UNCENSOR ZOOM VIEW ONLY If set to |
NO | Yes | No |
| URLRESOURCETYPE | RESOURCE TYPE FOR URL MATCHING | NON | Yes | No |
| USEPORTOFENTRY | USE REMOTE HOST NAME AS PORT OF ENTRY Indicates that the remote computer’s host name is to be used as the port of entry for user authentication. The port of entry can be used to restrict the computers from which a user can connect. |
YES | No | No |
| USERIDENCODEALLOW | USERID ALLOW DRIVER ENCODED Allows USERID provided by drivers to be ENCODED during authentication when this parameter is set to YES. When set to YES the Server will allow, but not require ENCODED USERID values. This setting provides the ability for new drivers to send USERID values that are ENCODED or Clear text, provides toleration for older Drivers which do not support encoded USERID. |
YES | NO | |
| USERIDENCODEREQUIRED | USERID REQUIRE DRIVER ENCODED Specifies that the USERID provided by drivers should be encoded during authentication when this parameter is set to Yes. For drivers that do not have encoding support, the corresponding USERID will not be allowed to authenticate. If older driver support is required, use USERIDENCODEALLOW. . |
YES | NO | |
| VCFMAXLIFETIME | SECURITY OPT VCID RETENTION LIMIT Client connections that request the use of Diffie-Hellman key exchange for encryption of logon credentials require an extra round trip during session establishment to exchange public keys. For clients using the PERMANENT connection mode, the overhead entailed by the extra round trip is usually negligible in comparison to the total number of round trips made throughout the session. For non-permanent connection mode (VCF TRANSBLOCK or TRANSACT mode), in which a new connection is established for each client request, the ratio of key exchange round trips is much higher; often as high as 50% of all network trips. To avoid extra round trips, VCF can cache Diffie-Hellman key exchange information during the initial connection and recall the information when each VCF reconnection occurs. For this, the server creates a cache VCF security artifact at the host. Note that VCF security artifacts are only used when clients request the use of Diffie-Hellman key exchange for encryption of logon credentials, and only for clients making non-PERMANENT (VCF) mode session connections. If set to 0, no VCF security artifacts are created and each VCF connection or reconnection makes the extra round trip needed for Diffie-Hellman key exchange. When this parameter is set to a non-zero value, VCF security artifacts are created at the host and used to avoid the extra round trip for key exchange. The server substitutes 60 seconds if the value specified is in the range from 1 to 59. A non-zero value specifies the total time, in seconds, that a cached VCF security artifact remains valid. VCF security artifacts are aged from the time they are created up to this limit, and are unconditionally expired once this period has ended. Unreferenced VCF artifacts may time out and be expired (see VCFTIMEOUT) sooner than the lifetime limit imposed by this parameter. |
1800 SECONDS | No | No |
| VCFTIMEOUT | SECURITY OPT VCID REUSE TIMEOUT PERIOD This parameter is not used when VCFMAXLIFETIME has been set to zero. See the explanation for the VCFMAXLIFETIME parameter for a description of VCF security artifacts. This parameter specifies, in seconds, the time period in which a VCF security artifact must be re-referenced to remain active. Any VCF artifact that goes unreferred to for longer than the time period specified is considered expired and are deleted. The time limit value specified for this parameter should not exceed the value set for the VCFMAXLIFETIME parameter. If an invalid value is specified, the server substitutes the same value set for VCFMAXLIFETIME. |
300 SECONDS | No | No |
| WWWDEFAULTAUTHREQ | DEFAULT WWW RULE AUTHREQ VALUE Specifies the default WWW AUTHREQ value under which Web transactions run. The AUTHREQ specification can be overridden through matching to WWW rules. |
NO | No | No |
| WWWDEFAULTRUNAUTH | DEFAULT WWW RULE RUNAUTH USERID Specifies the MVS user ID under which Web transactions, by
default, run. The user ID specified is made the effective userid for Web transactions unless WWW
rules override this value. If set to |
NONE | No | No |
| WWWRUNAUTHFORMATS | RUNAUTH OPERAND FORMATS Used to limit the allowed operand formats. If set to
|
ALL | No | No |
| WWWRUNAUTHLOCATION | RUNAUTH ALLOWED LOCATION Specifies where the RUNAUTH parameter may be coded for /*WWW rules. It may be restricted to the master WWW ruleset only, or disabled using this parameter. |
ANYWHERE | No | No |
| ZEVRESOURCETYPE | RESOURCE TYPE FOR Z/EVENTS Specifies the name of the security server's class (or resource type for ACF2) that is used to perform access authorization checks for z/Events resources. |
NON | Yes | No |