Define query profiles to control access to data sources
Query profiles control access to data sources. These profiles
are defined to the general SAF class (RTE_SECURITY_CLASS
).
If more granular access control is required, the profiles are defined
to the class identified by the KOB_SAF_QUERY_CLASS_NAME
parameter.
About this task
The authority to issue query requests from the OMEGAMON® enhanced 3270 user
interface to a product agent instance is verified by checking for
access to an SAF resource named in this pattern: Kpp.msn.tablename
where
- Kpp
- Is the product code of the agent instance. For example, for OMEGAMON for CICS, the product code is KCP. For OMEGAMON for z/OS®, the product code is KM5. See Product codes for other products.
- msn
- Is a managed system name. A managed system name typically identifies a unique Tivoli Enterprise Monitoring Server agent instance. Note that the form of managed system names differs from product to product. Check the agent-specific Configuration and Planning Guide for information about the form used for managed system names.
- tablename
- Is the name of the data source (attribute group, or table) defined within the product agent.
Note that if a matching SAF profile does not exist to protect a given query, that query is allowed.
For example, suppose you want to control the ability to issue a query to an OMEGAMON for z/OS agent running on
Sysplex IBMTEST on Sysplex member TSTA, for table KM5xxxxx. Assuming that the SAF class name is
$KOBSEC, you would define a profile named KM5.IBMTEST:TSTA:MVSSYS.KM5xxxxx by entering these
commands:
RDEFINE $KOBSEC KM5.IBMTEST:TSTA:MVSSYS.KM5xxxxxx UACC(NONE) SETROPTS RACLIST($KOBSEC) REFRESH
More generally, you could define a profile to control all data queries for a specific product:
RDEFINE $KOBSEC KM5.** UACC(NONE)
SETROPTS RACLIST($KOBSEC) REFRESH
To secure near-term history configuration actions, the O4SRV.** profile definition must be added
to the global security class definition, or to the query class, if one is used. The following are
example RACF SAF definitions to accomplish the security updates:
RDEFINE classname O4SRV.** UACC(NONE)
SETROPTS RACLIST(classname) REFRESH
PERMIT O4SRV.** ID(userid) ACCESS(READ) CLASS(classname)