Skip Headers
Oracle® Identity Manager Connector Guide for CA ACF2 Advanced
Release 9.0.4

Part Number E10423-03
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

1 About the Connector

The Oracle Identity Manager CA ACF2 Advanced connector provides a native interface between Oracle Identity Manager and CA ACF2 installed on a z/OS mainframe. The connector functions as a trusted virtual administrator on the target system, performing tasks, such as creating login IDs and changing passwords. In addition, it automates some of the functions that administrators usually perform manually.

The connector enables provisioning and reconciliation with CA ACF2. This guide discusses the connector that enables you to use CA ACF2 either as a managed (target) resource or as an authoritative (trusted) source of user information for Oracle Identity Manager.

This chapter discusses the following topics:

1.1 Certified Deployment Configurations

Table 1-1 lists the certified deployment configurations.

Table 1-1 Certified Deployment Configurations

Item Requirement

Oracle Identity Manager

Oracle Identity Manager release 8.5.3.1 or later

Target System

CA ACF2 r6.2, r8.0 SP4 or later, r9.0 SP1 or later, r12

Infrastructure Requirements: message transport layer

TCP/IP with Advanced Encryption Standard (AES) encryption

Target system user account for Oracle Identity Manager

IBM Authorized Program Facility (APF)-authorized account with SystemAdministrators privileges


Note:

The LDAP Gateway uses the target system user account that you create for Oracle Identity Manager. Therefore, it has the privileges required to access and operate with the Reconciliation Agent and Provisioning Agent. See "Connector Architecture" for information about the Reconciliation Agent and Provisioning Agent.

1.1.1 Message Transport Layer Requirements

Between the Oracle Identity Manager and mainframe environments, Oracle Identity Manager supports the TCP/IP message transport layer.

For the TCP/IP message transport layer, ports 5190 and 5790 are the default ports for the Reconciliation Agent and Provisioning Agent respectively. You can change the ports for these agents.

The procedure to configure this message transport layer is described later in this guide.

1.1.2 Configuration of APF Authorization

Granting the IBM Authorized Program Facility (APF) Authorized status to a program is similar to granting superuser status. This process will allow a program to run without allowing system administrators to query or interfere with its operation. The program that runs on the mainframe system and the user account it runs under must both have APF authorization. For example, the Provisioning Agent user account must also have APF authorization.

Note:

APF authorization is usually done by a mainframe administrator. If you do not have the required authority to perform such tasks, you should arrange to enlist the assistance of someone who is qualified to perform these tasks.

1.2 Certified Languages

The connector supports the following languages:

1.3 Features of the Connector

This section discusses the following topics:

1.3.1 Connector Architecture

The CA ACF2 Advanced connector consists of the following components:

  • LDAP Gateway: The LDAP Gateway is built on Java 1.4 and allows portability across various platforms and operating systems. The LDAP Gateway receives LDAP protocol commands from distributed applications and translates them to native mainframe commands. After the commands are run, LDAP-formatted responses are returned to the requesting application. It is recommended that you install the LDAP Gateway on the same computer as Oracle Identity Manager.

  • Pioneer Provisioning Agent: The CA ACF2 Advanced connector provides the provisioning functionality through the Pioneer Provisioning Agent, which is a mainframe component. The Provisioning Agent receives native mainframe identity and authorization change events from the LDAP Gateway. These events are processed against the mainframe authentication repository, in which all provisioning updates from the LDAP Gateway are stored. The response is parsed and returned to the LDAP Gateway.

  • Voyager Reconciliation Agent: The CA ACF2 Advanced connector provides the reconciliation functionality through the Voyager Reconciliation Agent, which is a mainframe component. The Reconciliation Agent captures native mainframe events by using exit technology. Exits are programs that are run after a system event in the mainframe is processed. The Reconciliation Agent captures in real time events occurring from the TSO logins, the command prompt, batch jobs, and other native mainframe events. The Reconciliation Agent transforms these events into notification messages for Oracle Identity Manager through the LDAP Gateway.

  • Message Transport Layer: The message transport layer enables the exchange of messages between the LDAP Gateway and the Reconciliation Agent and Provisioning Agent. You can use the following messaging protocol for the message transport layer:

    TCP/IP with AES encryption: This uses 128-bit cryptographic keys. The CA- ACF2 Advanced connector supports a message transport layer by using the TCP/IP protocol, which is functionally similar to proprietary message transport layer protocols.

The architecture of the connector can be explained in terms of the connector operations it supports:

1.3.1.1 Reconciliation

Figure 1-1 shows the flow of data during reconciliation.

Figure 1-1 Reconciliation Process

Description of Figure 1-1 follows
Description of "Figure 1-1 Reconciliation Process"

Reconciliation involves the following steps:

  1. Mainframe identity and authorization events take place in the mainframe target system. The mainframe events are processed through appropriate exits.

    Note:

    Identity and authorization events in the mainframe system consist of TSO logon, running of a command, real-time password synchronization, creation or deletion of a user, or a change in the user attributes.
  2. The mainframe events are stored in the subpool 231 cache of the Voyager Reconciliation Agent. Subpool 231 is an area of z/OS storage that the Reconciliation Agent uses to temporarily store CA ACF2 events. The subpool 231 cache enables the Reconciliation Agent to handle a large number of events from the mainframe.

  3. The Reconciliation Agent reads these events and transforms them into notification messages for the LDAP Gateway. Reconciliation Agent opens a new socket to the LDAP Gateway and sends the notification messages. The messages are sent to the LDAP Gateway through the message transport layer. These messages contain the minimum amount of data required to reconcile the event, such as message type, user id, and password (for a password change event).

    Note:

    When the mainframe system is shut down, event records are stored offline. These offline events are reloaded in the Reconciliation Agent when the mainframe is started up.
  4. The LDAP Gateway receives the messages from the Reconciliation Agent and decrypts them for the connector.

  5. The connector sends a request to the Provisioning Agent to retrieve all the current user data that is generated as a result of the mainframe identity and authorization events.

  6. If an event fetched from the target system matches with the notification data, then the connector returns an error and the process stops. If the event does not match, then the connector sends the event to Oracle Identity Manager for reconciliation processing and updates the internal meta-store of event records. This process is repeated for all the events that are fetched from the target system.

1.3.1.2 Provisioning

Figure 1-2 shows the flow of data during provisioning.

Figure 1-2 Provisioning Process

Description of Figure 1-2 follows
Description of "Figure 1-2 Provisioning Process"

Provisioning involves the following steps:

  1. A user is created, updated, or deleted in Oracle Identity Manager.

  2. The Oracle Identity Manager process task adapter for CA ACF2 forwards the change request to the LDAP Gateway.

  3. The LDAP Gateway translates the change request from the LDAP Gateway to mainframe commands. The CA ACF2 Advanced connector encrypts the data, and sends it to the Provisioning Agent through the message transport layer.

  4. The connector also updates the internal meta-store of the LDAP Gateway with the changes in user data.

  5. On the target system, the Provisioning Agent decrypts the data, sends the data to the mainframe repository, and returns success or error messages back to the LDAP Gateway.

1.3.2 Functionality Supported by the Pioneer Provisioning Agent

The Pioneer Provisioning Agent supports the following functions:

  • Standard CA ACF2 user profile commands:

    • [INSERT]: Creates a CA ACF2 user profile

    • [CHANGE]: Modifies a CA ACF2 user profile

    • [DELETE]: Deletes a CA ACF2 user profile

  • Standard CA ACF2 group profile commands:

    • [CHANGE]: Adds a CA ACF2 user to a group. This command works based on the variables that set access rights. To add a CA ACF2 user to a group, the variables are R(A), W(A), EXEC(A), and ALLOC(A).

    • [CHANGE]: Removes a CA ACF2 user from a group. To remove a CA ACF2 user from a group, the variables are R(P), W(P), EXEC(P), and ALLOC(P).

  • Standard CA ACF2 data set and resource profile commands:

    • [SET RULE]: Provides data set or resource profile access to a user

1.3.3 Functionality Supported for Provisioning

Table 1-2 describes the functions supported by the Provisioning Agent:

Table 1-2 Functionality Supported for Provisioning

Function Description

Create Users

Adds new users in CA ACF2.

Modify Users

Modifies user information in CA ACF2.

Change Passwords

Changes user passwords on CA ACF2 in response to password changes made on Oracle Identity Manager through user self-service.

Reset Passwords

Resets user passwords on CA ACF2. The passwords are reset by the administrator.

Disable User Accounts

Disables users in CA ACF2.

Enable User Accounts

Enables users in CA ACF2.

Delete Users

Removes users from CA ACF2.

Grant Users Access To Data Sets

Sets ACF2 rule by adding the user to a ACF2 resource.

Grant Users Access To Privileges (TSO)

Provides TSO login access to users.


1.3.4 Functionality Supported by the Voyager Reconciliation Agent

The Voyager Reconciliation Agent supports reconciliation of changes that are made to user profiles by using commands such as ADDUSER or ALTUSER. These commands also contain users' passwords for reconciliation, if any.

1.3.5 Functionality Supported for Reconciliation

The Reconciliation Agent supports the following functions:

  • Change passwords

  • Password resets

  • Create user data

  • Modify user data

  • Disable users

  • Delete users

  • Enable users

1.3.6 Target System Fields Used for Reconciliation and Provisioning

This section discusses the following topics:

1.3.6.1 User Field Mapping

Table 1-3 lists the user field mappings that are reconciled between Oracle Identity Manager and the target system:

Table 1-3 Field Mapping Between Oracle Identity Manager and CA ACF2

Oracle Identity Manager Field CA ACF2 Field Description

uid

USER

User's login ID.

cn

NAME

User full name.

sn

NAME

User last name.

givenName

NAME

User first name.

userPassword

PASSWORD

Password used to login.

privileges

SECURITY (Including custom privileges)

Privileges for the user, including custom privileges.

activeDate

ACTIVE

Privilege to allow or deny access based on a date.

group

GROUP (Restriction Group)

Default restriction group for the user.

passwordExpire

PSWD-EXP|NOPSWD-EXP

Indicates that a user's password has been manually expired. This field lets a security administrator force this user to change password.

cicsid

CICSID

CICS operator ID.

accessCnt

ACC-CNT

Count of times a user accessed the system.

accessDate

ACC-DATE

Date when the user accessed the system for the last time.

accessSrce

ACC-SRCE

The system component accessed by the user.

accessTime

ACC-TIME

Time when the user accessed the system for the last time.

prefix

PREFIX

The zero to eight character key of the rule used to validate access to a data set.

kerbVio

KERB-VIO

The number of Kerberos key violations.

kerbCurv

KERBCURV

The Kerberos key version.

pwsdDate

PSWD-DAT

The date of the last invalid password attempt. The date is displayed in the mm/dd/yy, dd/mm/yy, or yy/mm/dd formats depending on the DATE field of the GSO OPTS record. Year designations of 70-99 assume a date in the 20th century (1970-1999). Year designations of 00-69 assume a date in the 21st century (2000-2069).

Note: Refer to the target system documentation for information about GSO.

pwsdInv

PWSD-INV

The number of password violations that occurred since the last successful logon. This field can be reset to zero by a security administrator.

pwsdTod

PWSD-TOD

The date and time when a user changed password. CA ACF2 lists the date in the mm/dd/yy, dd/mm/yy, or yy/mm/dd formats depending on the DATE field of the GSO OPTS record. You cannot set this field. CA ACF2 maintains and displays it. Year designations of 70-99 assume a date in the 20th century (1970-1999). Year designations of 00-69 assume a date in the 21st century (2000-2069).

pwsdVio

PWSD-VIO

The number of password violations that occurred on PSWD-DAT.

minDays

MINDAYS

The minimum number of days that must elapse before a user can change password. Zero indicates no limit.

maxDays

MAXDAYS

The maximum number of days (based on the date specified in the PSWD-TOD field) that the user is permitted to change password before the password expires. Zero indicates no limit.

tsocommand

TSOCMDS

Command to be run during TSO/E logon.

tsodest

DFT-DEST

Default SYSOUT destination.

tsoDefaultPrefix

DFT-PFX

The one to eight character default TSO prefix that is set in the user's profile at logon time.

tsounit

TSOUNIT

Default UNIT name for allocations.

tsoRba

TSORBA

The Mail Index Record Pointer (MIRP) for the user.

tsoacctnum

TSOACCT

Default TSO account number on the TSO/E logon panel.

tsoholdclass

DFT-SUBH

Default hold class.

tsoSubmitClass

DFT-SUBC

Default submit class.

tsomaxsize

TSOSIZE

The maximum region size the user can request at logon.

tsomsgclass

DFT-SUBM

Default message class.

tsoproc

TSOPROC

Default login procedure on the TSO/E logon panel.

tsosize

TSORGN

Minimum region size if not requested at logon.

tsosysoutclass

DFT-SOUT

Default SYSOUT class.

revoke

NA

Value is Y if user is revoked or N if user is resumed.

tsoPerf

TSOPERF

The user's default TSO performance group.

tsoMail

MAIL

Indicates that a user can receive mail messages from TSO at logon time.

tsoAcctPriv

ACCTPRIV

Indicates that the user has TSO accounting privileges.

tsoAllCmds

ALLCMDS

Indicates the ability to bypass the CA ACF2 restricted command lists by entering a special prefix character.

tsoJcl

JCL

Indicates the ability to submit batch jobs from TSO and to use SUBMIT, STATUS, CANCEL, and OUTPUT commands.

tsoWtp

WTP

Indicates that CA ACF2 displays write-to-programmer messages.

tsoFscrn

TSOFSCRN

Indicates that a user can use the full-screen logon display.

tsoMount

MOUNT

Indicates permission to issue mounts for devices.

tsoOperator

OPERATOR

Indicates that a user has TSO operator privileges.

tsoNotices

NOTICES

Indicates that a user can receive TSO notices at logon time.

tsoPrompt

PROMPT

Indicates that CA ACF2 prompts a user for missing or incorrect parameters.

tsoLgnAcct

LGN-ACCT

Indicates the permission to specify an account number at logon time.

tsoLgnMsg

LGN-MSG

Indicates that the user has permission to specify a message class at logon time.

tsoLgnPerf

LGN-PERF

Indicates the permission to specify a performance group at logon time.

tsoLgnProc

LGN-PROC

Indicates the permission to specify the TSO procedure name at logon time.

tsoLgnTime

LGN-TIME

Indicates the permission to specify the TSO session time limit at logon time.

tsoLgnRcvr

LGN-RCVR

Indicates the permission to use the recover option of the TSO or TSO/E command package.

tsoLgnSize

LGN-SIZE

Indicates that the user is authorized to specify any region size at logon time by overriding TSOSIZE.

tsoLgnUnit

LGN-UNIT

Indicates permission to specify the TSO unit name at logon time.

tsoIntercom

INTERCOM

Indicates that the user is willing to accept messages from other users through the TSO SEND command.

secVio

SEC-VIO

Indicates the number of cumulative security violations for a user.

updTod

UPD-TOD

Indicates the date and time when a login ID record was last updated.


1.3.6.2 Resource Profile Field Mapping

Table 1-4 lists resource profile field mappings between Oracle Identity Manager and the target system.

Table 1-4 Dataset Resource Profile Field Descriptions

Oracle Identity Manager Field CA ACF2 Field Description

cn

PROFILE NAME

The profile id

standardAccessList

ID,ACCESS,ACCESS COUNT

The standard access list of ID and access for the dataset

conditionalAccessList

ID,ACCESS,ACCESS COUNT

The condition access list of ID and access for the dataset

owner

OWNER

The owner of the dataset

auditing

AUDITING

Indicates whether auditing should be enabled

notify

NOTIFY

Indicates whether notification is enabled for any changes to resource profiles

instdata

DATA

The installation data for the dataset


1.4 Roadmap for Deploying and Using the Connector

The CA ACF2 Advanced connector deployment involves deploying the LDAP Gateway, Reconciliation Agent, and Provisioning Agent. The Reconciliation Agent and Provisioning Agent are deployed on the mainframe.

These procedures are described in the following chapters: