Assign SAF users and groups to the zosConnectAccess
role to control which users can access
IBM® z/OS® Connect .
This task is applicable when IBM z/OS Connect is
used as an API provider.
About this task
Now you have configured the IBM z/OS Connect server
to require authentication by setting the attribute
requireAuth="true"
, you assign SAF users and groups
to the zosConnectAccess
role.
This task assumes that RACF® is used as security manager.
If you are using an alternative External Security Manager, refer to the appropriate product
documentation for the equivalent commands.
Procedure
- Configure the server to use SAF for authorization.
This configures the
IBM z/OS Connect server to
perform authorization checks against the SAF registry. The
zosConnectAccess
role
check is performed against the authenticated SAF user ID. Add the following element to the
server.xml configuration
file:
<safAuthorization id="saf-authorization"/>
To display SAF
authorization messages such as RACF
ICH408I, when unauthorized users attempt to access IBM z/OS Connect , specify the attribute
racRouteLog="ASIS"
.
For more information about the
safAuthorization
element, see the Server configuration section in the IBM
WebSphere® Application Server for z/OS Liberty documentation.
- Assign users and groups to the
zosConnectAccess
role. For SAF
authorization, access is controlled using the SAF EJBROLE profile
profilePrefix.zos.connect.access.roles.zosConnectAccess
.
- Define the SAF EJBROLE profile.
Enter the following
command:
RDEFINE EJBROLE profilePrefix.zos.connect.access.roles.zosConnectAccess UACC(NONE)
In
this command,
profilePrefix is the value used for this server as specified on the
profilePrefix
attribute of the
safCredentials
element in
server.xml. The default profile prefix value is BBGZDFLT.
- Activate the EJBROLE class
Enter the following
command
SETROPTS CLASSACT(EJBROLE)
- Assign the user IDs and groups who require authority to access.IBM z/OS Connect READ access to this profile.
For example, to assign group "STAFF" and user "EMPLOY1" to the
zosConnectAccess
role, enter the following
commands:
PERMIT profilePrefix.zos.connect.access.roles.zosConnectAccess CLASS(EJBROLE) ID(STAFF) ACCESS(READ)
PERMIT profilePrefix.zos.connect.access.roles.zosConnectAccess CLASS(EJBROLE) ID(EMPLOY1) ACCESS(READ)
- Refresh the EJBROLE class.
Enter the following
command:
SETROPTS RACLIST(EJBROLE) REFRESH
- Ensure the user IDs and groups have also been granted READ access to the
profilePrefix
APPL
profile.
- Start, or restart the server if it was already running, to pick up the changes made to
the RACF class profiles.
Results
The SAF users and groups assigned to the zosConnectAccess
role now have
authorization to access IBM z/OS Connect .
What to do next
You might be interested in configuring more specific
authorization. See the task How to configure authorization levels with a SAF user registry.