General OTMA security considerations
A number of general security considerations exist for OTMA that you should be aware of.
- If you use RACF® (or an
equivalent product) for security, define the
IMSXCF.group.client_member_name
in the FACILITY class.If you define the
IMSXCF.group.client_member_name
in the FACILITY class, and if IMS security is not set toNONE
, the user token for the client-bid request must be valid and the user must have READ access to the FACILITY class.If the user token for a client-bid request fails RACF verification, the client receives a NAK message from the server.
- Authorize the z/OS® cross-system coupling facility client for z/OS.
- If you define your OTMA applications with full security, the security environment is kept until the application ends.
- After IMS receives messages from OTMA, when OTMA security is activated, IMS calls RACF to verify that the user ID in the incoming message is a valid RACF user ID. IMS is not passed a password for the user ID, so the call to RACF is to verify the user ID only. If a password must be validated, it must be validated before sending the message to IMS.
- IMS uses the UTOKEN in the input message in the call to RACF not only to verify the user ID, but also to create a security control block in the IMS control region to represent each verified user ID. The security control blocks built in the IMS control region, representing verified RACF user IDs, are called accessor environment elements or ACEEs.
- The DL/I ICAL call has special security requirements related to the OTMA security configuration. The DFSYICAL tmember that is used for synchronous program switch request processing uses OTMA security configuration settings even if OTMA is not enabled.
- If distributed network security credentials, including the network user ID and the network session ID, are passed to IMS in the security-data section of the OTMA message prefix, the credentials are included in IMS log records, such as X'01' and X'03'. To enable distributed network security credentials to be logged in RACF SMF records, specify LOGSTR=YES in the OTMA client descriptor of the DFSYDTx member of the IMS PROCLIB data set. After LOGSTR=YES is specified, the first 255 bytes of the distributed network security credentials that are sent to OTMA are logged in RACF SMF records.