ISPF client security
The ISPF client must be secure so that only authorized users can access stored files.
The security mechanism used by the Engineering Workflow Management ISPF daemon relies on the file system where it resides to be secure. This implies that only trusted system administrators should be able to update the program libraries and configuration files.
The user ID under which the ISPF daemon runs (as defined in BLZRACFT) should be added to the SAF Group that has write access to the Engineering Workflow Management working directories when sample configuration JOB BLZCPBTK was submitted.
Through the ISPF client, you provide the user's Engineering Workflow Management userid and password to the ISPF daemon through the dialogs. The authentication data provided by the client is only used once, during initial connection login. Once a user ID is authenticated, the user ID and self-generated PassTickets are used for all actions that require authentication. When you log out or exit the ISPF client, the authentication connection is lost and you must authenticate again the next time you use the ISPF client. Using PassTickets provides an explanation of the ISPF daemon security process.
- Security settings and classes for the ISPF client
- OMVS segment for ISPF client users
- Data set profiles for the ISPF client
- ISPF daemon started task on System z
- ISPF daemon as a secure z/OS UNIX System Services server
- Application protection for the ISPF daemon
- ISPF PassTicket support
- z/OS UNIX System Services program-controlled files for the ISPF daemon