Z/OS Common Information Model User's Guide for Version 2 Release 4 (V2R4)
Total Page:16
File Type:pdf, Size:1020Kb
z/OS 2.4 Common Information Model User's Guide IBM SC34-2671-40 Note Before using this information and the product it supports, read the information in “Notices” on page 335. This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2021-04-26 © Copyright International Business Machines Corporation 2005, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................. xi Tables................................................................................................................ xiii Abstract.............................................................................................................. xv How to send your comments to IBM.................................................................... xvii If you have a technical problem............................................................................................................... xvii z/OS information................................................................................................ xix Summary of changes...........................................................................................xxi Summary of changes for z/OS Common Information Model User's Guide for Version 2 Release 4 (V2R4)...................................................................................................................................................xxi Summary of changes for z/OS V2R3......................................................................................................... xxi General content changes for z/OS Common Information Model........................................................xxi Summary of changes for z/OS Common Information Model User's Guide for Version 2 Release 2 (V2R2).................................................................................................................................................. xxii Message changes for z/OS Common Information Model User's Guide.............................................xxii Code changes for z/OS Common Information Model User's Guide..................................................xxiii Interface changes for z/OS Common Information Model User's Guide........................................... xxiii General content changes for z/OS Common Information Model User's Guide................................xxiv Part 1. Introduction and concepts.......................................................................... 1 Chapter 1. Introduction............................................................................................................................... 3 Chapter 2. CIM indication concept.............................................................................................................. 7 Indication delivery retry......................................................................................................................... 7 How indications work............................................................................................................................. 8 Chapter 3. z/OS CIM security concept...................................................................................................... 11 Part 2. Installation and setup...............................................................................15 Chapter 4. Installation...............................................................................................................................17 Migration from a previous z/OS release...............................................................................................17 Fallback to a previous z/OS release.....................................................................................................18 Chapter 5. Quick guide: CIM server setup and verification...................................................................... 19 Step 1: Setting up the security for the CIM server.............................................................................. 19 Quick security setup for RACF........................................................................................................19 Security setup for a production environment................................................................................ 20 Step 2: Customizing the file systems and directories......................................................................... 20 Step 3: Using default TCP/IP ports 5988 and 5989............................................................................20 Step 4: Starting the CIM server............................................................................................................21 Step 5: Customizing the UNIX System Services shell.........................................................................21 Step 6: Running the installation verification program (IVP)............................................................... 21 iii Chapter 6. CIM server security setup........................................................................................................23 Defining a CIM server user ID.............................................................................................................. 23 Configuring the resource authorization model of the CIM server.......................................................24 Enabling the must-stay-clean feature............................................................................................25 Setting up program control.............................................................................................................25 Granting clients and administrators access to the CIM server........................................................... 26 Switching identity (surrogate)..............................................................................................................27 Configuring the CIM server HTTPS connection using AT-TLS............................................................. 27 Example: Configuring AT-TLS for secure communication..............................................................28 Defining the CFZAPPL profile for the APPL class.................................................................................32 Defining an encryption key for PassTicket validation..........................................................................32 Setting up multilevel security (MLS) support...................................................................................... 32 Considering Automatic Restart Manager security...............................................................................33 Chapter 7. CIM provider setup and security............................................................................................. 35 Setting up the CIM server for RMF monitoring.................................................................................... 35 Setting up the CIM server for network providers................................................................................ 36 Setting up the CIM server for Cluster, CoupleDataset, and JES2-JES3Jobs providers..................... 36 PARMLIB updates........................................................................................................................... 36 RACF setup......................................................................................................................................37 Sysplex couple dataset formatting.................................................................................................37 JES authorities................................................................................................................................ 38 Setting up the CIM server for WLM management............................................................................... 39 Setting up the CIM server for storage management........................................................................... 39 Running providers in a designated user context................................................................................. 40 Utilizing the provider based authorization model............................................................................... 41 Chapter 8. Customization.......................................................................................................................... 43 Configuring the ports for the CIM server............................................................................................. 43 Customizing CFZRCUST....................................................................................................................... 44 Prerequisites................................................................................................................................... 44 Option 1: Placing /var/wbem in a separate file system............................................................... 44 Option 2: Using an existing file system for /var/wbem................................................................ 45 System specific directories.............................................................................................................45 Considerations for customizing CIM Server in a z/OS Sysplex......................................................46 Customizing the CIM server startup...................................................................................................