Certificate Authority (CA) validation
Part of the certificate validation process includes checking that the certificate was signed by a Certificate Authority (CA) you trust. In order to do so, RSE daemon must have access to a certificate that identifies the CA.
RACDCERT CERTAUTH ADD(dsn) HIGHTRUST WITHLABEL('label')
RACDCERT CERTAUTH LIST
RACDCERT CERTAUTH ALTER(LABEL('HighTrust CA')) HIGHTRUST
RACDCERT ID(stcrse) CONNECT(CERTAUTH LABEL('HighTrust CA') RING(keyring.racf))
*AUTH*/*
). You must add the CA
certificates to the RSE keyring.Refer to Security Server RACF Command Language Reference (SA22-7687) for more information on the RACDCERT command.
Attention: If you rely on RSE daemon
instead of your security software to authenticate a user you must
be cautious not to mix CAs with a TRUST and HIGHTRUST status in your |
RSE uses the configuration file /etc/zexpl/ssl.properties to determine the
keyring for accessing the CA certificate, even if the communication is encrypted with AT-TLS. For
X.509 authentication, the ssl.properties
variables
daemon_keydb_file
and server_keystore_type
must be configured.
Certificates with the HostIdMappings extension have user ID and target host name embedded in the
certificate itself. To use this feature, you must mark the CA certificate as HIGHTRUST and the RSE
daemon user ID requires read access to the IRR.HOST.hostname
profile in the
SERVAUTH
class. Refer to Authentication by your security software for
more information.
RDEFINE SERVAUTH IRR.HOST.CDFMVS08.RALEIGH.IBM.COM UACC(NONE)
PERMIT IRR.HOST.CDFMVS08.RALEIGH.IBM.COM CLASS(SERVAUTH) ACCESS(READ) ID(stcrse)
SETROPTS CLASSACT(SERVAUTH) RACLIST(SERVAUTH)
SETROPTS RACLIST(SERVAUTH) REFRESH