Z/OS Common Information Model User's Guide for Version 2 Release 4 (V2R4)

Z/OS Common Information Model User's Guide for Version 2 Release 4 (V2R4)

z/OS 2.4 Common Information Model User's Guide IBM SC34-2671-40 Note Before using this information and the product it supports, read the information in “Notices” on page 335. This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2021-04-26 © Copyright International Business Machines Corporation 2005, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................. xi Tables................................................................................................................ xiii Abstract.............................................................................................................. xv How to send your comments to IBM.................................................................... xvii If you have a technical problem............................................................................................................... xvii z/OS information................................................................................................ xix Summary of changes...........................................................................................xxi Summary of changes for z/OS Common Information Model User's Guide for Version 2 Release 4 (V2R4)...................................................................................................................................................xxi Summary of changes for z/OS V2R3......................................................................................................... xxi General content changes for z/OS Common Information Model........................................................xxi Summary of changes for z/OS Common Information Model User's Guide for Version 2 Release 2 (V2R2).................................................................................................................................................. xxii Message changes for z/OS Common Information Model User's Guide.............................................xxii Code changes for z/OS Common Information Model User's Guide..................................................xxiii Interface changes for z/OS Common Information Model User's Guide........................................... xxiii General content changes for z/OS Common Information Model User's Guide................................xxiv Part 1. Introduction and concepts.......................................................................... 1 Chapter 1. Introduction............................................................................................................................... 3 Chapter 2. CIM indication concept.............................................................................................................. 7 Indication delivery retry......................................................................................................................... 7 How indications work............................................................................................................................. 8 Chapter 3. z/OS CIM security concept...................................................................................................... 11 Part 2. Installation and setup...............................................................................15 Chapter 4. Installation...............................................................................................................................17 Migration from a previous z/OS release...............................................................................................17 Fallback to a previous z/OS release.....................................................................................................18 Chapter 5. Quick guide: CIM server setup and verification...................................................................... 19 Step 1: Setting up the security for the CIM server.............................................................................. 19 Quick security setup for RACF........................................................................................................19 Security setup for a production environment................................................................................ 20 Step 2: Customizing the file systems and directories......................................................................... 20 Step 3: Using default TCP/IP ports 5988 and 5989............................................................................20 Step 4: Starting the CIM server............................................................................................................21 Step 5: Customizing the UNIX System Services shell.........................................................................21 Step 6: Running the installation verification program (IVP)............................................................... 21 iii Chapter 6. CIM server security setup........................................................................................................23 Defining a CIM server user ID.............................................................................................................. 23 Configuring the resource authorization model of the CIM server.......................................................24 Enabling the must-stay-clean feature............................................................................................25 Setting up program control.............................................................................................................25 Granting clients and administrators access to the CIM server........................................................... 26 Switching identity (surrogate)..............................................................................................................27 Configuring the CIM server HTTPS connection using AT-TLS............................................................. 27 Example: Configuring AT-TLS for secure communication..............................................................28 Defining the CFZAPPL profile for the APPL class.................................................................................32 Defining an encryption key for PassTicket validation..........................................................................32 Setting up multilevel security (MLS) support...................................................................................... 32 Considering Automatic Restart Manager security...............................................................................33 Chapter 7. CIM provider setup and security............................................................................................. 35 Setting up the CIM server for RMF monitoring.................................................................................... 35 Setting up the CIM server for network providers................................................................................ 36 Setting up the CIM server for Cluster, CoupleDataset, and JES2-JES3Jobs providers..................... 36 PARMLIB updates........................................................................................................................... 36 RACF setup......................................................................................................................................37 Sysplex couple dataset formatting.................................................................................................37 JES authorities................................................................................................................................ 38 Setting up the CIM server for WLM management............................................................................... 39 Setting up the CIM server for storage management........................................................................... 39 Running providers in a designated user context................................................................................. 40 Utilizing the provider based authorization model............................................................................... 41 Chapter 8. Customization.......................................................................................................................... 43 Configuring the ports for the CIM server............................................................................................. 43 Customizing CFZRCUST....................................................................................................................... 44 Prerequisites................................................................................................................................... 44 Option 1: Placing /var/wbem in a separate file system............................................................... 44 Option 2: Using an existing file system for /var/wbem................................................................ 45 System specific directories.............................................................................................................45 Considerations for customizing CIM Server in a z/OS Sysplex......................................................46 Customizing the CIM server startup...................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    374 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us