The topics in this section cover activities an administrator performs to maintain SNA applications. More details about these activities can be found in BEA TUXEDO documentation. Before attempting the activities, it is essential that you become familiar with BEA TUXEDO configuration procedures.
The administrative interface for BEA Connect SNA has two components:
dmadmin
, other shell-level commands, and by screens of the BEA TUXEDO Graphical Administrative Interface.
The
Note:
The following four The dmadmin Command Interpreter
dmadmin
interactive command interpreter is used for the administration of domain gateway groups defined for a BEA TUXEDO System/T application. It can operate in two modes, administration mode and configuration mode. Configuration mode allows the administrator to change a configuration while the application is running. The dmadmin
description in Appendix A, "Reference Pages," of this guide has been edited to include material specific to Connect SNA and new subcommands that apply only to Connect SNA.
dmadmin
commands are not applicable to Connect SNA because transactions, in the BEA TUXEDO System sense, are not supported:
dsdmlog
New subcommands have been added to dmadmin
to support entering of userids and passwords in the domain security table. These new commands can be entered only as subcommands of dmadmin
:
The reference pages for these subcommands and other /Domain commands have been modified for the BEA Connect SNA product. Use Appendix A, "Reference Pages," in preference to similar pages in the BEA TUXEDO Reference Manual.
The Please refer to You can manually start When you start Please refer to Please refer to In order for any security checking to occur, the TUXEDO Local Domain and the Host System must have security mechanisms in place. For the Local Domain, this is the Authorization Server. For the Host System, this is the External Security Manager. Figure 5-1 shows these elements.
There are four sections in two BEA TUXEDO configuration files in which you specify parameters bearing on Local Domain security. The two configuration files are DMCONFIG and UBBCONFIG.
Userid and password mapping between the Local Domain and the Host System also bears on security. There are five
Caution:
Mixed environment security is more complex than depicted in Figure 5-1. A domain without an operational security mechanism in place accepts all transaction requests by treating userids as "trusted users." Refer to TUXEDO documentation for more detailed information about domain security.
The configuration sections where security is specified are:
The SNACRM and PU 2.1 Servers
SNACRM
communicates directly with the PU 2.1 server to provide SNA connectivity. These servers are not BEA TUXEDO-based and can be started manually or via the DMINIT
server. In either case, the PU 2.1 server must always be started before the SNACRM
. Both servers must be started before starting the associated SNA Domain gateway group. Once the SNACRM
and PU2.1 servers are started, there is no reason to restart them, outside of a catastrophic failure.
Starting the PU2.1 Server
SNACRM
in Appendix A, "Reference Pages," of this guide for information about starting the PU2.1 server.
Starting the SNACRM
SNACRM
from the command line or during tmboot
with the DMINIT
server. You can either start all SNACRM
processes with a single DMINIT process or individually start each one with a DMINIT
server that is defined to each gateway server group.
SNACRM
from the UNIX command line, the SNACRM
Command Line Console puts its prompt in this window, and if exited, shuts down all of the active links. When started from DMINIT
, the console is redirected to the null device. In this case, you can use the xsnacrm
command to monitor the console and enable/disable tracing of SNACRM
and the SNA stack.
SNACRM
in Appendix A, "Reference Pages," of this guide.
Using DMINIT
SNACRM
in Appendix A, "Reference Pages," of this guide for information about using DMINIT
.
Security
DMADMIN
subcommands which you use to enter userids and passwords, set up mappings, remove mappings, remove userids and passwords, and modify passwords.
Figure 5-1 Connect SNA Security Elements
Where You Specify Security Parameters
*RESOURCES
section of the UBBCONFIG file
*DM_LOCAL_DOMAINS
section of the DMCONFIG file
The where UBBCONFIG File Security Parameters
*RESOURCES
section in this file contains a SECURITY
parameter which works in conjunction with the SECURITY
parameter in the DMCONFIG
file to establish how Connect SNA controls access to the TUXEDO local domain. This parameter takes the form:
SECURITY = value
value
is:
NONE
APP_PW
USER_AUTH
APP_PW
, but additional authorization is required on a per-user basis.
ACL
USER_AUTH
, but additional access-control checks are done on service names, queue names, and event names. If no Access Control Lists (ACL) exists for a given name, access is granted.
MANDATORY_ACL
ACL
, but if no ACL exists for a given name, access is denied.
In most cases, the UBBCONFIG file has already been configured and you don't need to establish the SECURITY
parameter settings, but examining this file enables you to ascertain how Connect SNA enforces security.
If this parameter is set to NONE
, no security is enforced. If set to APP_PW
, the local TUXEDO domain's Authorization Server prompts for the application password. If set to USER_AUTH
, ACL,
or MANDATORY_ACL
, the qualified security is enforced as specified.
Three sections in the DMCONFIG file contain parameters affecting Connect SNA control of access to the TUXEDO local domain:
*DM_LOCAL_DOMAINS
section contains a SECURITY
parameter which specifies the type of security enforced for the TUXEDO local domain.
The where *DM_LOCAL_DOMAINS section
SECURITY
parameter settings in this section work in conjunction with the SECURITY
parameter in the *RESOURCES
section of the TUXEDO local domain's UBBCONFIG file to establish how Connect SNA controls access to the TUXEDO local domain. The parameter takes the form:
SECURITY = value
value
is:
NONE
APP_PW
DM_USER_PW
If this parameter is set to NONE
or APP_PW
, the local domain takes no action with regard to security. If this parameter is set to DM_USR_PW
, the local domain enforces security according to the setting in the UBBCONFIG
file (refer to "UBBCONFIG File Security Parameters" on page 5-6).
This section of the DMCONFIG file is dedicated to Connect SNA parameters. It records the security in effect for the host system. It correlates to the values set for the ATTACHSEC
parameter in the connection resource definition. In the following parameter definition, remote refers to the TUXEDO domain and local refers to the host system. The parameter takes the form:
SECURITY_TYPE = value
where value
is:
LOCAL
LOCAL
is the default value.
IDENTIFY
VERIFY
PERSISTENT
MIXIDPE
The values LOCAL
and IDENTIFY
are roughly equivalent to NONE
and APP_PW
for the SECURITY
parameter in the DMCONFIG file.
This section contains local Access Control Lists (ACL) used by the TUXEDO local domain to restrict access by remote regions to local resources. (Refer to "Security Administration" in the TUXEDO Administrator's Guide.) Each entry consists of an ACL_NAME
resource identifier along with a list of required parameters
designating remote domains permitted to access the resource. If no entry exists for a local service, the service is accessible to all remote domains.
The domain administrator can add or delete users from the domain security table in two ways: first, through data entry panels in the TUXEDO System administration Graphical Administrative Interface; second, by using the dmadmin
command.
The combined settings of the SECURITY
parameters in the UBBCONFIG
and the DMCONFIG
files have the following effects:
DM_LOCAL_DOMAINS
Security parameter is set to NONE
or APP_PW
, no action is taken by the Connect SNA gateway with regard to security.
UBBCONFIG
file SECURITY
parameter must be set to one of USER_AUTH
, ACL
, or MANDATORY_ACL
*DM_LOCAL_DOMAINS
section SECURITY
parameter must be set to DM_USER_PW
*DM_SNALINKS
SECURITY
parameter must be set to IDENTIFY
or VERIFY
(Refer to Table 5-2 for a summary of the file settings required to achieve different security combinations for outbound requests from the local domain.)
If security is to be enforced by both the local domain and the host system for each request inbound from the host system to the local domain, the following settings must be made:
UBBCONFIG
file SECURITY
parameter must be set to one of USER_AUTH
, ACL
, or MANDATORY_ACL
;
DMCONFIG
file *DM_LOCAL_DOMAINS
section SECURITY
parameter must be set to DM_USER_PW
*DM_SNALINKS
SECURITY
parameter must be set to IDENTIFY
or VERIFY
.
(Refer to Table 5-1 for a summary of the file settings required to achieve different security combinations for inbound requests from the host system.)
For a request sent to the host system, the local principal userid is located in the domain security table and the associated remote userid, or userid and password, are put into the conversation start-up request before being sent over the LU6.2 conversation. (This occurs if For requests sent from the host system, the local domain extracts the remote userid, or userid and password, from the conversation start-up request and checks the domain security table. That table contains pairs of local principal userids and remote userids, maintained on a service-by-service basis. The remote userid is mapped to the local principal userid. The local principal userid and password are used for further Access Control List (ACL) When a request is received from the host system, the local domain checks the Therefore, if the Table 5-1 shows settings for the
Note:
Security setting combinations other than those shown in the tables will have unpredictable results.
SECURITY
is set to IDENTIFY
or VERIFY
in the DM_SNALINKS
section of the DMCONFIG
file.)
checking, as specified in the UBBCONFIG
file.
DMCONFIG
file ACL for the local service to see if requests from the remote domain are permitted. If the DMCONFIG
file does not contain an ACL for the local service, the service is accessible to all requests.
ATTACHSEC
level for the connection definition in the host system is Identify
or Verify
, the DMCONFIG SECURITY
parameter must be set to DM_USER_PW
so that a userid and a password are sent on the conversation start-up requests.
Security Setting Summary Tables
SECURITY
parameters in the UBBCONFIG and DMCONFIG files required to achieve local domain and host system security combinations for inbound requests.
Table 5-2 shows settings for the
Note:
Security setting combinations other than those shown in the tables will have unpredictable results.
SECURITY
parameters in the UBBCONFIG and DMCONFIG files required to achieve local domain and host system security combinations for outbound requests.
After setting up and/or checking the security settings for the TUXEDO domain and the host system, you must relate the security information in both domains to each other. To do this, use the Once the user security information in both domains is mapped, you can perform administration on the affected security files in each domain. To do this, use the The following paragraphs discuss how you enter these commands. Refer to Appendix A, "Reference Pages," for detailed information about each subcommand.
Use the where:
How To Administer Security
addusr
and addumap
subcommands provided with the dmadmin
command interpreter.
delumap
, modusr
, and delusr
subcommands.
Adding a Userid and Password
addusr
subcommand to add a TUXEDO local domain's userid and password to the remote CICS/ESA domain's user and password file. Enter the following command:
addusr -d local_domain_id -R remote_domain_id -u remote_userid
-d
-R
-u
Use the addumap
subcommand to map a local domain principal userid number to a remote domain user name. The userid must be added before it can be mapped (refer to "Adding a Userid and Password"). Enter the following command:
addumap -d local_domain_id -R remote_domain_id
-p local_principal_userid -u remote_userid
where:
-d
-R
-p
-u
Use the delumap
subcommand to remove the mapping for a local domain principal userid to a remote domain user name. Enter the following command:
delumap -d local_domain_id -R remote_domain_id
-p local_principal_userid -u remote_userid
where:
-d
-R
-p
-u
Use the delusr
subcommand to remove a local TUXEDO domain's user ID and password from the CICS/ESA remote domain's user and password file. The mapping for a userid must be removed before the userid can be removed (refer to "Removing a Userid's Mapping"). Enter the following command:
delusr -d local_domain_id -R remote_domain_id -u remote_userid
where:
-d
-R
-u
Use the modusr
subcommand to modify a local TUXEDO domain user's password recorded in a CICS/ESA remote domain's user and password file. Enter the following command:
modusr -d local_domain_id -R remote_domain_id -u remote_userid
where:
-d
-R
-u
Like other parts of BEA TUXEDO Systems, Connect SNA uses the Typed Buffer to transmit and receive data. When communication is between a Connect SNA application and a remote host region, there are some special considerations.
Since the remote host application does not understand the TUXEDO typed buffer, the TUXEDO application must communicate with the host application by using an aggregate data type known as a record. A record is a flat data area defined by a template that describes the data type and length of each field in the record.
The TUXEDO typed buffer must be represented to the host application as record aggregate data, and the record must be represented to the TUXEDO application as a typed buffer. In addition, string data must be in EBCDIC format for the host region and in ASCII format for the TUXEDO application.
The data may be manipulated into the correct format by the TUXEDO application or remote host application, or it may be formatted prior to transmission by Connect SNA. The service definitions in the *DM_LOCAL_SERVICES
and the *DM_REMOTE_SERVICES
section of the DMCONFIG file provide parameters to describe the typed buffer/record combination required for successful communications between TUXEDO applications and host applications. These parameters are INBUFTYPE
and OUTBUFTYPE
.
The parameter definitions are made from the perspective of the receiver of the buffer, the TUXEDO application which receives a typed buffer, or the remote host application which receives record data. That is, INBUFTYPE
is used to format a typed buffer into a record for the remote host application; OUTBUFTYPE
is used to format a host record into a typed buffer for the TUXEDO application.
The TUXEDO application buffer is a typed buffer that must be communicated to the remote host as a record containing aggregate data fields. Connect SNA looks at the service definition to determine what, if any, conversion must be applied to the data buffer. The service definition uses the INBUFTYPE
in both the *DM_LOCAL_SERVICES
and *DM_REMOTE_SERVICES
section of the DMCONFIG file to describe the type of buffer manipulation.
INBUFTYPE = type:subtype
In this parameter definition, type
must be one of the designated TUXEDO typed buffers described in the following subsections.
The subtype
value names a view and is required for certain TUXEDO typed buffers.
Only one type:subtype
may be entered for the INBUFTYPE
parameter.
The null terminated string is converted to EBCDIC. The null character is part of the converted record.
No data conversion is performed on these typed buffers. The TUXEDO application or remote host application performs all conversion of data fields in the record. This includes all numeric and EBCDIC conversions.
These typed buffers are used when a data record cannot be described or converted using one of the other strong typed buffers. Strong means that Connect SNA can understand all data fields and perform the required data conversions.
These typed buffers are also options when the remote service expects many styles of data aggregation (multiple record types). The INBUFTYPE
parameter is limited to one type:subtype
.
A subtype is required for these typed buffers. The subtype is the name of the view that describes the remote host record. The TUXEDO buffer is converted from a C structure to the record, including EBCDIC conversion, using the compiled VIEW file. By default, the record is a COBOL structure, mapped by the remote host application using a COBOL copybook.
A subtype is required for these typed buffers. The subtype is the name of the view that describes the remote host record. The data in the typed buffer is Field Manipulation Language (FML) data. The Connect SNA converts the buffer to a record described by the view; this includes EBCDIC conversion.
The TUXEDO buffer is converted from an FML typed buffer to a C structure using the subtype compiled VIEW file. The C structure is then converted to the record using the same subtype compiled VIEW file. By default, the record is a COBOL structure that is mapped by the remote host application using a COBOL copybook
An aggregate data type known as a record is received from the remote host application. The record must be converted to a TUXEDO typed buffer by Connect SNA before it is passed to the TUXEDO application. Connect SNA looks at the service definition to determine what, if any, conversion must be applied to the host data buffer. The service definition uses the OUTBUFTYPE
in both the *DM_LOCAL_SERVICES and *DM_REMOTE_SERVICES section of the DMCONFIG file to describe the host record, and how to convert the record to the TUXEDO typed buffer.
OUTBUFTYPE=type:subtype
In this parameter definition, type
must be one of the designated TUXEDO typed buffers described in the following subsections. The type
not only determines the typed buffer, but also describes the host record.
The subtype
value names a view and is required for certain TUXEDO typed buffers.
Only one type:subtype
may be entered for the OUTBUFTYPE
parameter.
The null terminated string is converted to ASCII. The converted string is moved to a TUXEDO STRING typed buffer.
No data conversion is performed on these typed buffers. The remote host application or the TUXEDO application converts the data fields in the record. This includes all numeric and ASCII conversions.
These typed buffers are used when the data record cannot be described or converted using one of the other strong type buffers. Strong means Connect SNA can understand all data fields and perform the required data conversion.
These typed buffers are also options when the remote service expects many styles of data aggregation (multiple record types). The OUTBUFTYPE
parameter is limited to one type:subtype
.
A subtype is required for these typed buffers. The subtype is the name of the view that describes the remote host record. The remote host record is converted to a TUXEDO typed buffer. The compiled VIEW file is used to perform the data and ASCII conversion on the host record. By default, the host record is a COBOL data aggregate and the converted typed buffer is mapped by the TUXEDO application using a C structure.
A subtype is required for these typed buffers. The subtype is the name of the view that describes the remote host record. The host record is converted to an FML buffer that is passed to the TUXEDO application.
By default, the host record is a COBOL record aggregate data type. The data is converted to a C structure, including ASCII conversion, using the compiled VIEW file. This data is then converted to an FML buffer using the field definitions associated with the VIEW.
Connect SNA supports remote CICS services as Distributed Program Link (DPL) programs (as described in Chapter 1, "Introducing BEA Connect SNA"). The DPL support is performed as if the TUXEDO service is a peer CICS/ESA service.
In a DPL program, the application is protected from all Distributed Transaction Processing (DTP). The DPL application is a request/response service, with all data communication performed by the passing of a COMMAREA
.
A basic DPL request API looks like this:
EXEC CICS LINK
PROGRAM()
DATALENGTH()
LENGTH()
COMMAREA()
In the preceding example, the requester sends the COMMAREA
of DATALENGTH
size and the receiving application receives the COMMAREA
data contents in a buffer the size of LENGTH
. The DATALENGTH
size might be smaller then the LENGTH
size, but the requester expects and receives the response in the original COMMAREA
buffer the size of LENGTH
.
The difference between a DPL program and a TUXEDO service is that a receiving TUXEDO service can resize a reply buffer, while the DPL program expects a reply buffer of a designated size. Also, a TUXEDO requester can receive a resized buffer in a buffer different from the original reply buffer.
Connect SNA performs the manipulation described in the following subsections to smoothly adjust to the requirements of both types of applications.
Connect SNA must determine what size COMMAREA
the remote DPL service is expecting because there is no corresponding LENGTH
parameter on a TUXEDO request.
To determine the LENGTH
value for a DPL request, Connect SNA uses the larger potential size of the INBUFTYPE
or the OUTBUFTYPE
parameter definitions, as described in Table 5-3.
The remote DPL application receives a buffer of LENGTH
size and returns a buffer of LENGTH
size.
If no Connect SNA receives a The current size limit of remote host messages is limited to approximately 32K bytes. Any conversions resulting in records larger than 32756 bytes are not supported.
LENGTH
can be determined, then the largest value allowed by the CICS application is allocated. Refer to the "Usage Notes" section.
DPL Requests Originating From a CICS DPL
LENGTH
value and COMMAREA
data of DATALENGTH
size from the requesting CICS DPL. Connect SNA allocates a buffer of LENGTH
size and moves the COMMAREA
data into this buffer before performing the conversions.
Usage Notes