How to configure client certificate authentication with RACF
Configure a IBM® z/OS® Connect server to perform authentication of the identity in a TLS client certificate, mapping the certificate to a RACF® user ID, and then granting that user ID authority to access IBM z/OS Connect resources.
This task is applicable when IBM z/OS Connect is used as an API requester.
Before you begin
- Be familiar with the information in API requester authentication and identification.
- You must have completed the task How to activate and configure the SAF user registry to configure the IBM z/OS Connect server to use z/OS authorized services and a SAF user registry.
- You must have configured a TLS connection between the CICS® application, and the IBM z/OS Connect server with TLS client authentication enabled. For example, by completing the steps in the task How to configure TLS with RACF key rings and How to configure an AT-TLS connection from CICS
- You need to know the subject value of the client certificate to be mapped.
- You need to know the user ID to which the TLS client certificate will be mapped, and this user ID must exist and have an OMVS segment.
- You must have authorization to issue the
RACDCERT MAP
command. For more information about theRACDCERT
commands and the authorizations that are required, see RACDCERT (Manage RACF digital certificates) in the z/OS Security Server RACF Command Language Reference. - You must have write access to the server.xml configuration file.
About this task
You use RACF certificate name filtering, also called user ID mapping, to map the TLS client certificate to a RACF user ID. You then configure IBM z/OS Connect to perform authentication using a TLS client certificate.
During authentication, IBM z/OS Connect will call RACF to perform the mapping resulting in the mapped RACF user ID being the authenticated user ID.
appSecurity-2.0
feature is
configured.Procedure
Results
The TLS client certificate is mapped to a RACF user ID, and is authorized to access IBM z/OS Connect.