z/OS Security Server RACF Command Language Reference
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


RACDCERT MAP (Create mapping)

z/OS Security Server RACF Command Language Reference
SA23-2292-00

Purpose

Use the RACDCERT MAP command to define a user ID mapping, also called a certificate name filter. Defining a mapping results in the creation of a profile in the DIGTNMAP class. DIGTNMAP profiles are used as filters when a user attempts to access the system using a digital certificate. A user ID is found by comparing the issuer's distinguished name and subject's distinguished name from the certificate with the filter values used to create the DIGTNMAP profile. The user ID is specified with the ID keyword or specified in DIGTCRIT profiles if MULTIID is specified. When you specify MAP, you must specify IDNFILTER, SDNFILTER, or both.

See UTF-8 and BMP character restrictions for information about how UTF-8 and BMP characters in certificate names and labels are processed by RACDCERT functions.

Issuing options

The following table identifies the eligible options for issuing the RACDCERT MAP command:
As a RACF® TSO command? As a RACF operator command? With command direction? With automatic command direction? From the RACF parameter library?
Yes No No. (See rules.) No. (See rules.) No
Rules: The following rules apply when issuing this command.
  • The RACDCERT command cannot be directed to a remote system using the AT or ONLYAT keyword.
  • The updates made to the RACF database by RACDCERT are eligible for propagation with automatic direction of application updates based on the RRSFDATA profiles AUTODIRECT.target-node.DIGTMAP.APPL and AUTODIRECT.target-node.DIGTCRIT.APPL, where target-node is the remote node to which the update is to be propagated.

Authorization required

To issue the RACDCERT MAP command, you must have the SPECIAL attribute or sufficient authority to the IRR.DIGTCERT.MAP resource in the FACILITY class for your intended purpose.
Table 1. Authority required for the RACDCERT MAP function
IRR.DIGTCERT.MAP
Access level Purpose
READ Create a mapping associated with your own user ID.
UPDATE Create a mapping associated with another user ID or MULTIID.

Activating your changes

If the DIGTNMAP or DIGTCRIT class is RACLISTed, refresh the classes to activate your changes.

Example:
SETROPTS RACLIST(DIGTNMAP, DIGTCRIT) REFRESH

Related commands

  • To alter a user ID mapping, see RACDCERT ALTMAP.
  • To delete a user ID mapping, see RACDCERT DELMAP.
  • To list a user ID mapping, see RACDCERT LISTMAP.

The RACDCERT MAP command is unrelated to the RACMAP MAP command.

Syntax

For the key to the symbols used in the command syntax diagrams, see Syntax of RACF commands and operands. The complete syntax of the RACDCERT MAP command is:

 
RACDCERT MAP[(data-set-name)]

[ ID(mapping-owner) | MULTIID ]
[ SDNFILTER('subject's-distinguished-name-filter') ]
[ IDNFILTER('issuer's-distinguished-name-filter') ]
[ CRITERIA(criteria-profile-name-template) ]
[ WITHLABEL('label-name') ]
[ TRUST | NOTRUST ]

If you specify more than one RACDCERT function, only the last specified function is processed. Extraneous keywords that are not related to the function being performed are ignored.

If you do not specify a RACDCERT function, LIST is the default function.

For information on issuing this command as a RACF TSO command, refer to RACF TSO commands.

Parameters

MAP
MAP(data-set-name)

A data set name can be specified with the MAP keyword. The data-set-name value is the name of the data set that contains a certificate. The certificate provides a model for the filter names specified with SDNFILTER and IDNFILTER. The subject's distinguished name is used beginning with the value specified by SDNFILTER. The issuer's distinguished name is used beginning with the value specified by IDNFILTER. Using a model certificate is optional but can reduce the chance of typographical errors when entering long filters for SDNFILTER or IDNFILTER.

The model certificate used with the MAP keyword can have an issuer's distinguished name or subject's distinguished name that exceeds 255 characters. However, the portion of each used in the filter to associate a user ID with the certificate cannot exceed 255 characters.

See RACDCERT ADD for acceptable certificate formats.

The data-set-name value has the same characteristics (for example, RECFM) as the data set that can be specified with the ADD and CHECKCERT keywords. The issuer of the RACDCERT command must have READ access to the data set containing the data-set-name.

ID(mapping-owner) | MULTIID
Specifies the user ID to be associated with the new mapping. If you do not specify ID or MULTIID, the default is ID, and mapping-owner defaults to the user ID of the command issuer. If more than one keyword is specified, the last specified keyword is processed and the others are ignored by TSO command parse processing.
ID(mapping-owner)
Specifies the user ID to be associated with the mapping.
MULTIID
Specifies that additional criteria is used to determine the user ID to be associated with the mapping. You must also specify the CRITERIA keyword.
IDNFILTER('issuer's-distinguished-name-filter')
Specifies the significant portion of the issuer's distinguished name that is used as a filter when associating a user ID with a certificate. For an explanation of how filter values are used to associate a user ID with a digital certificate, see "Certificate name filtering" in z/OS Security Server RACF Security Administrator's Guide.

When specified without data-set-name on the MAP keyword, you must specify the entire portion of the distinguished name to be used as a filter.

The format of the issuer's-distinguished-name-filter is similar to the output displayed when a certificate is listed with RACDCERT. It is an X.509 distinguished name in an address type format:
component.component.component.component
Or, more specifically:
qualifier1=node1.qualifier2=node2.qualifier3=node3
Example:
IDNFILTER('OU=Class 1 Certificate.O=BobCA, Inc.L=internet.C=US')

Restriction: The filter name cannot contain the ¢ character (X'4A').

The IDNFILTER value is limited to 1024 characters and must begin with a prefix found in the following list, followed by an equal sign (X'7E'). Each component should be separated by a period (X'4B'). The case, blanks, and punctuation displayed when the digital certificate information is listed must be maintained in the IDNFILTER. Because digital certificates only contain characters available in the ASCII character set, the same characters should be used for the IDNFILTER value. Valid prefixes are:
Country
Specified as C=
State/Province
Specified as SP=
Locality
Specified as L=
Organization
Specified as O=
Organizational Unit
Specified as OU=
Title
Specified as T=
Common Name
Specified as CN=
When specified along with data-set-name on the MAP keyword, the issuer's-distinguished-name-filter must correspond to a starting point within the issuer's distinguished name found in the certificate contained in the data set. You should specify enough of the name to precisely identify the starting point for the filter. For example, if the certificate in the data set has the issuer OU=Class 1 Certificate.O=BobCA, Inc.L=internet.C=US and you want all certificates issued by BobCA to be selected by this filter, specify:
IDNFILTER('O=BobCA')
Without the data set containing the certificate, you need to enter the following to produce the same result:
IDNFILTER('O=BobCA, Inc.L=internet.C=US')

IDNFILTER is optional if SDNFILTER is specified. If IDNFILTER is not specified, only the subject's name is used as a filter. If IDNFILTER is specified and only a portion of the issuer's name is to be used as the filter, SDNFILTER must not be specified.

If both IDNFILTER and SDNFILTER are specified, the IDNFILTER value does not need to begin with a valid prefix from the list above. This allows the use of certificates from a certificate authority that chooses to include nonstandard data in the issuer's distinguished name.

SDNFILTER('subject's-distinguished-name-filter')
Specifies the significant portion of the subject's distinguished name that is used as a filter when associating a user ID with a certificate. For an explanation of how filter values are used to associate a user ID with a digital certificate, see "Certificate name filtering" in z/OS Security Server RACF Security Administrator's Guide.

When specified without data-set-name on the MAP keyword, you must specify the entire portion of the distinguished name to be used as the filter.

The format of the subject's-distinguished-name-filter is similar to the output displayed when a certificate is listed with RACDCERT. It is an X.509 distinguished name in an address type format:
component.component.component.component
Or, more specifically:
qualifier1=node1.qualifier2=node2.qualifier3=node3
For example:
SDNFILTER('CN=Bob Cook.OU=BobsAccounting.O=BobsMart.L=internet')

Restriction: The filter name cannot contain the ¢ character (X'4A').

The SDNFILTER value is limited to 1024 characters and must begin with a prefix found in the following list, followed by an equal sign (X'7E'). Each component should be separated by a period (X'4B'). The case, blanks, and punctuation displayed when the digital certificate information is listed must be maintained in the SDNFILTER. Because digital certificates only contain characters available in the ASCII character set, the same characters should be used for the SDNFILTER value. Valid prefixes are:
Country
Specified as C=
State/Province
Specified as SP=
Locality
Specified as L=
Organization
Specified as O=
Organizational Unit
Specified as OU=
Title
Specified as T=
Common Name
Specified as CN=
When specified along with data-set-name on the MAP keyword, the subject's-distinguished-name-filter must correspond to a starting point within the subject's distinguished name found in the certificate contained in the data set. You should specify enough of the name to precisely identify the starting point for the filter. For example, if the certificate in the data set has the subject CN=Bob Cook.OU=BobsAccounting.O=BobsMart.L=internet and you want all certificates for anyone in BobsAccounting to be selected by this filter, specify:
SDNFILTER('OU=BobsAcc')
Without the data set containing the certificate, you need to enter the following to produce the same result:
SDNFILTER('OU=BobsAccounting.O=BobsMart.L=internet')

SDNFILTER is optional if IDNFILTER is specified. If SDNFILTER is not specified, only the issuer's name is used as a filter. SDNFILTER must not be specified with IDNFILTER unless the value of IDNFILTER will result in the entire issuer's name being used in the filter. Note that subject's name can be partial but cannot be used in a filter that contains only a partial issuer's name.

CRITERIA(criteria-profile-name-template)
When specified with MULTIID, it indicates a dynamic user ID mapping. The user ID associated with this mapping profile is based not only on the issuer's distinguished name and the subject's distinguished name found in the certificate, but also on additional criteria. The criteria-profile-name-template specifies the additional criteria in the form of a profile name containing one or more variable names, separated by free-form text. These variable names begin with an ampersand (&) and end with a period. The free-form text should identify the variables contained in the template:
variable-name1=&variable-name1.variable-name2=&variable-name2
For example, if the application identity and system identifier are to be considered in determining the user ID associated with this mapping, the CRITERIA keyword should be specified as follows:
CRITERIA(APPLID=&APPLID.SYSID=&SYSID)
The RACF-defined criteria are the application ID (APPLID) and the system-identifier (SYSID). When a user presents a certificate to the system for identification, the identity of the application (as well as the system the user is trying to access) being accessed becomes part of the criteria. The application passes its identity to RACF, and RACF determines the system-identifier. The system-identifier is the 4-character value specified for the SID parameter of the SMFPRMxx member of SYS1.PARMLIB. These values are substituted for &APPLID and &SYSID in the criteria.
Once the substitution is made, the fully expanded criteria template is used as a resource name to find a matching profile defined in the DIGTCRIT class using the RDEFINE command. For example, if the application being accessed is BANKU on system SYSA, the template is:
APPLID=BANKU.SYSID=SYSA
You should define a profile in the DIGTCRIT class using the RDEFINE command for this name. The user ID to be associated with these certificates must be specified as the APPLDATA. While the DIGTCRIT profile name can be discrete, generic profiles can be used if you have generic profile checking active for the DIGTCRIT class. A DIGTCRIT profile name of APPLID=BANKU.* allows the certificates to be used on any system, rather than just system SYSA. While generic characters such as * and % can be used when defining the DIGTCRIT class profiles, they should not be used in the template name specified with the CRITERIA keyword.

Criteria names other than APPLID and SYSID are allowed, but are effective in certificate name filtering if the application supplies these criteria names and their associated values to RACF when the user attempts to access the application using a certificate. SYSID is determined by RACF, but APPLID must be specified with the initACEE callable service. Criteria names, such as APPLID and SYSID, should only be specified on RACDCERT if the application instructs you to do so.

A maximum of 255 characters can be entered when specifying the CRITERIA keyword. The values can be entered in any case, but are made uppercase by the RACDCERT command because they must match uppercase profile names in the DIGTCRIT class to be effective. When specifying the criteria value, the maximum length for profile names in the DIGTCRIT class is 246 characters.

The CRITERIA keyword can only be set for MULTIID.

WITHLABEL('label-name')
Specifies the label that is assigned to this mapping. If specified, it must be unique to the user ID with which the mapping is associated. If WITHLABEL is not specified, a label is generated in the same manner as issuing the WITHLABEL keyword for the RACDCERT ADD command.

Up to 32 characters can be specified for label-name. It can contain imbedded blanks and mixed-case characters, and is stripped of leading and trailing blanks. If a single quotation mark is intended to be part of the label-name, use two single quotation marks together for each single quotation mark within the string, and enclose the entire string within single quotation marks.

TRUST | NOTRUST
When specified with MAP, indicates whether this mapping can be used to associate a user ID to a certificate presented by a user accessing the system. If neither TRUST nor NOTRUST is specified, the default is TRUST.

Examples

     
Example 1 Operation User RACFADM with SPECIAL authority requests the addition of a new mapping profile that will associate the user ID WEBUSER with all digital certificates issued by VeriSign for Class 1 Individual Subscribers. A certificate is not readily available in a data set.
Known User RACFADM has SPECIAL authority.
Command
RACDCERT ID(WEBUSER) MAP 
 IDNFILTER('OU=VeriSign Class 1 Individual Subscriber.O=VeriSign, Inc..L=Internet')
 WITHLABEL('Savings Account')
Output None.
 
Example 2 Operation User RACFADM with SPECIAL authority requests the addition of a new mapping profile that will associate all members of department BWVA, who have VeriSign Class 1 Individual subscriber certificates, with the user ID BWVAUSR. All members of the department have the organizational unit BWVA (OU=BWVA) as the second node of the subject name in their certificates. A certificate belonging to one of the department member is available in the data set JJONES.DEPTCERT. The use of the certificates should not be allowed until the network administrator gives his approval, so this mapping is currently not trusted.
Known User RACFADM has SPECIAL authority to profile IRR.DIGTCERT.MAP in the FACILITY class.
Command
RACDCERT ID(BWVAUSR) MAP('JJONES.DEPTCERT') 
  IDNFILTER('OU=VeriSign Class 1') NOTRUST 
  SDNFILTER('OU=BWVA') WITHLABEL('BWVA USERS')
Output None.
 
Example 3 Operation User CERTADM with ALTER authority to profile IRR.DIGTCERT.MAP in the FACILITY class has received a digital certificate and placed it in the data set CERTADM.MODEL.CERT. BobsBank has contracted VeriSign, Inc. to create certificates like the one received. These certificates will be installed on the workstations of each bank teller, and used to access the banking application BANKAPP. All certificates must map to the user ID BANKU which has access to the data sets containing the banking data. CERTADM uses this function to display the issuer's name and subject name from the certificate.
Known User CERTADM has ALTER authority to profiles IRR.DIGTCERT.MAP in the FACILITY class.
Commands
RDEF DIGTCRIT BOBS.APPLID1=BANKAPP APPLDATA('BANKU')
RACDCERT MULTIID MAP(MODEL.CERT)
  IDNFILTER('OU=')
  SDNFILTER('CN=')
  CRITERIA(BOBS.APPLID1=&APPLID)
  WITHLABEL('Bobs Tellers') 
Output None.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014