Table of Contents Previous Next PDF


Configuring Oracle Tuxedo Mainframe Adapter for TCP Security

Configuring Oracle Tuxedo Mainframe Adapter for TCP Security
The TMA TCP product supports a security feature that allows a requester from Oracle Tuxedo services to pass a user ID requirement through the OTMA or CICS server interfaces for verification through a third-party security package.
Note:
Security Checking from Tuxedo to Mainframe
Figure 3‑1 depicts the process flow for security verifications from TMA TCP Gateway on UNIX to a mainframe.
Figure 3‑1 Security Checking for UNIX to Mainframe Transactions
1.
2.
Verify user name (reviewing the tpusr file), group (reviewing the tpgrp file), and ACL (reviewing the tpacl file). If all three pass, the transaction request processes. If any one of the three are rejected, the transaction request stops and a security violation occurs.
Note:
3.
4.
5.
 
Security Checking from Mainframe to UNIX
Figure 3‑2 depicts the process flow for security verifications from a mainframe to TMA TCP Gateway on UNIX.
Figure 3‑2 Security Checking for Mainframe to UNIX Transactions
1.
2.
3.
4.
Decode the appkey to obtain the user and group numbers. Verify the user name against the security system. If the user name is valid and the user has the authority to run the transaction, the transaction request is accepted. If the user name is not valid, the request is rejected and a security violation occurs.
5.
Setting Up Security for TMA TCP for IMS
The TMA TCP for IMS product has an OTMA interface that supports enhanced security. This interface allows a requester from Oracle Tuxedo services to pass a user ID through the OTMA server interface for authorization through your security package.
Securing Connections from IMS to UNIX
Complete the following tasks to enable the connection security feature.
1.
Specify the ACCOUNT and PASSWORD parameters in the GATEWAY configuration statement for local or remote gateways.
2.
Verify that the parameter values for ACCOUNT and PASSWORD in the GATEWAY statement match the RMTACCT and PASSWORD values in the *FOREIGN section of the TMA TCP Gateway GWICONFIG file.
Securing Connections from IMS to IMS
Complete the following tasks to enable the connection security feature.
1.
Specify the ACCOUNT and PASSWORD parameters in the GATEWAY configuration statement for local or remote gateways.
2.
Verify that the parameter values for ACCOUNT and PASSWORD in the GATEWAY statement for the GATEWAY TYPE=LOCAL match the ACCOUNT and PASSWORD values in the GATEWAY TYPE=REMOTE statement.
Securing Connections from IMS to CICS
Complete the following tasks to enable the connection security feature.
1.
Specify the ACCOUNT and PASSWORD parameters in the GATEWAY TYPE=LOCAL configuration statement.
2.
Verify that the parameter values for ACCOUNT and PASSWORD in the GATEWAY TYPE=LOCAL statement match the ACCOUNT and PASSWORD values in the User Account Connection screen.
Securing Services
Complete the following tasks to enable the service security feature.
1.
2.
Specify OTMASECURITY=Y in the SYSTEM statement of your TMA TCP for IMS configuration file.
3.
Set the security flag for each local service using the SECURITY parameter in SERVICE TYPE=LOCAL statement. For parameter information, refer to the “Defining Local Services” section.
4.
Issue the /SEC OTMA PROFILE command in IMS to enable security checking on a service by service basis for the OTMA interface. Issue the /SEC OTMA FULL command in IMS to enable security checking on all services.
WARNING:
If SECURITY=N in the SERVICE TYPE=LOCAL statement for any local service definition, issue /SEC OTMA PROFILE. A security failure results if you specify SECURITY=N and issue /SEC OTMA FULL command.
 

Copyright © 1994, 2017, Oracle and/or its affiliates. All rights reserved.