CA-Topsecret to OS/390 Security Server Migration Guide
Total Page:16
File Type:pdf, Size:1020Kb
CA-TopSecret to OS/390 Security Server Migration Guide Product design similarities and differences Planning the migration Conversion methodologies Paul de Graaff Ted Anderson Julie Bergh Peter Desforge Lynn Kearney Lori Halberts Kikuchi Tony Nix Mark Shell ibm.com/redbooks International Technical Support Organization SG24-5677-00 CA-Top Secret to OS/390 Security Server Migration Guide October 2000 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix D, “Special notices” on page 109. First Edition (October 2000) This edition applies to SecureWay Security Server Version 2, Release Number 10, Program Number 5645-001 for use with the OS/390 Operating System Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. HYJ Mail Station P099 2455 South Road Poughkeepsie, NY 12601-5400 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 2000. All rights reserved. Note to U.S Government Users - Documentation related to restricted rights - Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures ......................................................vii Tables .......................................................ix Preface ......................................................xi The team that wrote this redbook .......................................xi Commentswelcome................................................xiii Chapter 1. The value of SecureWay Security Server for OS/390 .........1 1.1OverviewoftheSecurityServer.................................1 1.1.1 Business benefits of the Security Server .......................1 1.1.2 Financial benefits of the Security Server .......................3 1.2RACFadministrativehighlights..................................3 1.2.1 RACF administrative enhancements . .......................3 1.2.2RACF/DB2securityadministrationoverview....................5 1.3 RACF market penetration ......................................8 Chapter 2. SecureWay Security Server for OS/390 ...................11 2.1 SecureWay branding. .......................................11 2.2 Introduction to the SecureWay Security Server for OS/390 . ...........11 2.2.1 Resource Access Control Facility (RACF) .....................11 2.2.2TheDCESecurityServer.................................13 2.2.3 OS/390 firewall technologies. ............................14 2.2.4TheLDAPServer.......................................15 2.2.5 Network Authentication and Privacy Service (Kerberos) ..........16 2.2.6 OS/390 Open Cryptographic Services Facility (OCSF) ...........17 Chapter 3. RACF overview ......................................19 3.1Informationflow............................................20 3.1.1Authorizationflow.......................................22 3.2 Vocabulary ................................................23 3.2.1RACFuser............................................23 3.2.2RACFgroup...........................................24 3.2.3Owner................................................25 3.2.4RACFprotectedresources................................25 3.2.5RACFsystem-wideoptions................................27 3.2.6 The RACF database .....................................27 3.2.7 RACF commands .......................................28 3.3Interfaces.................................................30 3.3.1 Product interfaces .......................................30 3.3.2TheSAFinterface.......................................31 3.3.3RACFexits............................................31 Chapter 4. CA-Top Secret overview ...............................33 4.1 The CA-Top Secret security philosophy ..........................33 4.2TheCA-TopSecretenvironment................................36 4.2.1TheALLrecord.........................................36 4.2.2 Personnel . ............................................36 4.2.3Resourcerules.........................................37 4.2.4 CA-Top Secret database files . ............................38 4.3CA-TopSecretsubsysteminterfaces............................38 4.3.1TSO.................................................38 © Copyright IBM Corp. 2000 iii 4.3.2CICS................................................ 38 4.3.3IMS.................................................38 4.3.4DB2................................................. 38 Chapter 5. RACF migration project overview....................... 39 5.1 Preparing for the migration project plan . ......................... 39 5.1.1ReviewthecurrentCA-TopSecretenvironment................ 40 5.1.2 Personnel . .........................................42 5.1.3Education............................................43 5.2Buildingthemigrationprojectplan..............................44 5.2.1Significantprojecttasks.................................. 45 5.3 Resource scheduling ........................................ 49 5.4Summary................................................. 49 Chapter 6. Database migration .................................. 51 6.1 Conversion methodology . .................................... 51 6.1.1Migrationconsiderations.................................51 6.2ConvertingACIDs.......................................... 52 6.2.1CA-TopSecretuser/groupmigrationissues...................53 6.2.2ListingtheCA-TopSecretACIDs........................... 54 6.2.3ReviewinganddefiningACIDstoRACF.....................54 6.2.4 Converting zone, division and department ACIDs .............. 54 6.2.5ConvertingprofileACIDs................................. 55 6.2.6ConvertinguserACIDs.................................. 57 6.2.7ConvertingsecurityadministratorACIDs.....................58 6.2.8Password............................................. 60 6.2.9OtherCA-TopSecretuserACIDparameters.................. 62 6.3Convertingdatasets........................................ 62 6.3.1User-basedversusresource-basedprotection................. 63 6.3.2Datasetconversionoverview............................. 64 6.3.3DefiningdatasetprotectioninRACF........................ 65 6.3.4 Data control groups and the RACF high-level qualifier. ........ 65 6.3.5Datasetaccess........................................ 66 6.3.6 Undercutting considerations. .............................. 67 6.3.7OtherCA-TopSecrettoRACFdatasetmigrationissues......... 69 6.3.8Moredatasetconsiderations..............................71 6.4Convertingresources....................................... 72 6.4.1FACILITIES........................................... 72 6.4.2VOLUME............................................. 73 6.4.3OTRAN.............................................. 74 6.4.4LCFAUTH/EXMP......................................75 6.4.5DB2................................................. 75 6.4.6TERMINAL........................................... 76 6.4.7PROGRAM........................................... 76 6.4.8XAACID............................................. 77 6.4.9User-definedresources.................................. 77 6.5Otherconsiderations........................................ 78 6.5.1OS/390UNIXconsiderations..............................78 6.5.2STCs................................................ 78 6.6Convertingsystem-wideoptions............................... 80 6.6.1Commonsystem-widesecurityoptions...................... 80 6.6.2CPF................................................. 80 6.6.3 Protection modes. .................................... 80 iv CA-Top Secret to OS/390 Security Server Migration Guide 6.6.4Passwords............................................81 6.6.5RACFoptions..........................................81 Chapter 7. Administration and maintenance ........................83 7.1Theadministrativeinterface...................................83 7.2 Commands ................................................84 7.3RACFutilities..............................................86 7.4 Security reports. ............................................86 7.5Availabilityconsiderations.....................................89 7.5.1RACFactivebackupoption................................89 7.5.2 Reorganizing the RACF database ...........................90 7.6RACFperformanceconsiderations..............................90 7.6.1 Performance of shared databases...........................92 7.6.2Migrationissues........................................92 7.6.3Summary..............................................93 Appendix A. IBM migration services................................95 A.1Mainframesystemsoftware......................................95 A.2Migrationservices..............................................95 A.3Conversionvs.migration.........................................95 A.4Migrations-notwoarealike......................................95 A.5Migrationserviceofferings.......................................96 A.5.1Migrationassessmentservice.................................96 A.5.2 Database conversion service .................................96 A.5.3Migrationconsultingservices.................................96 A.5.4Migrationperformservices...................................96 A.5.5LearningServices..........................................97 A.6Productmigrations.............................................97 A.7Gettingstarted.................................................98 Appendix B. Security policy considerations .........................99