Define the JES command security
JES Job Monitor issues all JES operator commands requested by a
user through an extended MCS (EMCS) console, whose name is controlled
with the CONSOLE_NAME
directive, as documented in FEJJCNFG, the JES Job Monitor configuration file .
#console
placeholder with the actual console name. -
RDEFINE OPERCMDS MVS.MCSOPER.#console UACC(READ) DATA('IBM Explorer for z/OS')
-
RDEFINE OPERCMDS JES%.** UACC(NONE)
-
PERMIT JES%.** CLASS(OPERCMDS) ACCESS(UPDATE) WHEN(CONSOLE(JMON)) ID(*)
-
SETROPTS RACLIST(OPERCMDS) REFRESH
- Usage of the console is permitted if no
MVS.MCSOPER.#console
profile is defined. - The
CONSOLE
class must be active forWHEN(CONSOLE(JMON))
to work, but there is no actual profile check in theCONSOLE
class for EMCS consoles. - Do not replace
JMON
with the actual console name in theWHEN(CONSOLE(JMON))
clause. TheJMON
keyword represents the point-of-entry application, not the console name.
Attention: Defining JES commands
with universal access
NONE in your security software
might impact other applications and operations. Test the security
before activating it on a production system. |
Table 1 and Table 2 show the operator commands issued for JES2 and JES3, and the discrete security profiles that can be used to protect them.
Action | Command | OPERCMDS profile | Required access |
---|---|---|---|
Change CLASS |
|
|
UPDATE |
Change MSGCLASS |
|
|
UPDATE |
Hold | $Hx(jobid) with x = {J, S or T} |
|
UPDATE |
Release | $Ax(jobid) with x = {J, S or T} |
|
UPDATE |
Cancel | $Cx(jobid) with x = {J, S or T} |
|
UPDATE |
Purge | $Cx(jobid),P with x = {J, S or T} |
|
UPDATE |
Action | Command | OPERCMDS profile | Required access |
---|---|---|---|
Change CLASS | *F,J=jobid,C=class |
|
UPDATE |
Change MSGCLASS | *F,U,J=jobid,NCL=class |
|
UPDATE |
Hold | *F,J=jobid,H |
|
UPDATE |
Release | *F,J=jobid,R |
|
UPDATE |
Cancel | *F,J=jobid,C |
|
UPDATE |
Purge | *F,J=jobid,C |
|
UPDATE |
- The Hold, Release, Cancel, Purge, change CLASS, and change MSGCLASS JES operator commands, and
the Show JCL command, can be executed only against spool files owned by the client user ID, unless
LIMIT_COMMANDS=
with valueLIMITED
orNOLIMIT
is specified in the JES Job Monitor configuration file. For more information, see "Actions against jobs - target limitations" in the Host Configuration Reference Guide (SC27-8438). - Users can browse any spool file, unless
LIMIT_VIEW=USERID
is defined in the JES Job Monitor configuration file. For more information, see "Access to spool files" in Host Configuration Reference Guide (SC27-8438). - Even if users are not authorized for these operator commands,
they will still be able to submit jobs and read job output through
JES Job Monitor if they have sufficient authority to possible profiles
that protect these resources, such as those in the
JESINPUT, JESJOBS
andJESSPOOL
classes.
Assuming the identity of the JES Job Monitor server by creating a JMON console from a TSO session is prevented by your security software. Even though the console can be created, the point of entry is different; for example, JES Job Monitor versus TSO. JES commands issued from this console will fail the security check if your security is set up as documented in this publication and the user does not have authority to the JES commands through other means.