The Administrator Services subsystem provides several functions which apply to Natural Security as a whole and to all security profiles.
This section covers the following topics:
Access to the Administrator Services subsystem is controlled a) by the owner
specifications in the security profile of the Natural Security library
SYSSEC, and b) by the command processor NSCCMD01:
If no owner are specified in the security profile of SYSSEC, every user
of type "Administrator" may access the Administrator Services
subsystem.
If owners are specified in the security profile of SYSSEC, the field
Functional Security Defined for the command processor
NSCCMD01 in SYSSEC determines who may access the
Administrator Services subsystem:
If this field is set to Yes (this is the default), only the owners
of SYSSEC may access Administrator Services.
If this field is set to All, every user of type
"Administrator" may access Administrator Services.
In either case, the functional security specifications made in the library security
profile of SYSSEC and in the Administrators' user security profiles
determine which Administrator Services functions may be used.
For information on owners in library security profiles, see the sections Library Maintenance and Countersignatures. For information on
the command processor NSCCMD01, see the section Functional Security for
Library SYSSEC.
To invoke Administrator Services:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu will be displayed.
The Administrator Services Menu consists of two screens. With PF7 and PF8, you can switch between the two screens. They provide the following functions:
General Options (*)
You should study the functions marked above with (*) before you start defining objects to Natural Security. The other Administrator Services functions are not directly related to defining objects to Natural Security.
Before you start defining objects to Natural Security, it is advisable to specify a number of options which apply to the Natural Security system as a whole.
To invoke General Options:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
On this menu, select General Options.
The Set General Options screen will be displayed.
The Set General Options screen consists of two screens. With PF7 and PF8 you can switch between the two screens. They provide the following options:
The individual options are described below.
This option allows a smooth transition from an unprotected Natural environment to one protected by Natural Security.
| Y |
|
|---|---|
| N | Only users defined to Natural Security may use Natural. Any library not defined to Natural Security cannot be used. |
The effects of the Transition Period Logon settings are illustrated below.
If you have had an unprotected Natural installation and now have installed Natural
Security for the first time, it is advisable to set the Transition Period
Logon to Y so as to ensure that work with Natural may
continue while users and libraries are defined to Natural Security. Once all objects and
links are defined, the Transition Period Logon should be set to
N.


This option only appears if the Natural Development Server is installed and the current Natural session uses a development server file. It is only relevant if you wish to control the access to base and compound applications on the development server file. For details, see the section Protecting Natural Development Server Applications.
| Y |
Security for the development server file is active: The application security profiles for base and compound application defined in Natural Security take effect and control the access to the Natural Development Server objects base applications and compound applications on the development server file. The FSEC system file which is being used when this option is set to
If you set this option to The database ID and file number of the development server file for which the option is activated will be shown on the Set General Options screen. |
|---|---|
| N | Security for the development server file is not active. Application security profiles are not evaluated. |
| 1 - 9 | You may specify how many attempts to log on users shall have. After n unsuccessful logon attempts, the logon procedure will be terminated, the user "thrown out", and a logon-error record written (for information on logon-error records, see Logon Errors below). |
|---|
This option may be used to suppress the display of the messages NAT0853 and NAT0854, which indicate that a logon to a library has been successful. By default, one of these messages is displayed after every successful logon to a library.
| Y | Messages NAT0853 and NAT0854 will not be displayed. |
|---|---|
| N | Messages NAT0853 and NAT0854 will be displayed. |
This option may be used to prevent users from trying to misuse other users' user IDs and passwords. It applies to the logon procedure and to the countersignatures feature.
| Y |
Logon:
For logon attempts, the following applies: Once a user has reached the maximum number of logon attempts without entering the correct password, the respective user will be locked, that is, the user ID will be made "invalid". The following will be locked:
Countersignatures:
For countersign attempts, the following applies: After too many invalid passwords (the maximum number of logon attempts also applies here) on a countersign screen, the user who invoked the respective function (as identified by his/her Natural Security user ID) will be locked. |
|---|---|
| F |
Logon:
For logon attempts, "F" has the same effects as Countersignatures:
For countersign attempts, "F" has the same effect as
|
| X |
Logon:
For logon attempts, Countersignatures:
For countersign attempts, A user's error counters can be displayed by pressing PF16 in
his/her security profile. A list of all users whose error counters are greater
than |
| Z |
Logon:
For logon attempts, Countersignatures:
For countersign attempts, |
| N | The Lock User feature is not active. |
For logon attempts to libraries via Natural RPC service calls, this option only takes effect if the Lock user option in the Library Preset Values is set to "*". For Natural RPC service calls, the following applies:
The settings Y and F have the same effect as
X.
When locking occurs, the client user IDs which are locked will not include the ID
as contained in the system variable *INIT-USER.
This option corresponds to the option User password history set in the User Preset Values.
You may specify who may access Natural Security maintenance and retrieval functions from outside Natural Security via the application programming interfaces (APIs) provided. For details on these APIs, see the section Application Programming Interfaces.
| Y | Maintenance and retrieval functions may be accessed from outside Natural
Security via the APIs by anybody who may use the APIs.
If you set this option
to |
|---|---|
| R | Retrieval functions (but not maintenance functions) may be accessed from
outside Natural Security via the APIs by anybody who may use the APIs.
If you
set this option to |
| N | Maintenance and retrieval functions may be accessed from outside Natural
Security only by users (of type "Administrator") who may also use
the Natural Security library SYSSEC. With the APIs, they may only
perform those functions they are also allowed to perform within
SYSSEC, and only under the same conditions under which they may
perform them in SYSSEC.
|
Maintenance functions are all functions of the subprograms NSCFI,
NSCLI, NSCOB and NSCUS - except their Display
functions.
Retrieval functions are:
all functions of the subprograms NSCCHCK, NSCDEF,
NSCDU, and NSCXR and of the subprograms whose names
begin with NSCDA,
the Display functions of the subprograms NSCFI, NSCLI,
NSCOB and NSCUS.
| 0 - 3 | You may specify the minimum number of co-owners for each owner of a
security profile.
The number set here will be valid for all security profiles and cannot be modified individually. |
|---|
For an explanation of co-owners, see the section Countersignatures; leave the value set to
0 until you have read that section.
This option determines whether a library's security profile can be deleted if the library contains any source or object modules.
| Y | A library's security profile can be deleted even if the library contains
any source or object modules. When you try to delete a library security profile,
Natural Security will issue a warning if the library is not empty.
This option only affects the deletion of a library's security profile; the Natural library itself and the modules it contains are not deleted. |
|---|---|
| N | A library's security profile cannot be deleted as long as the library itself still contains any source or object modules. |
This option determines whether the values set on the Preset User Values and Preset Library Values screens may be overwritten in individual security profiles.
| Y | The specifications made on the Preset screens may be overwritten in the individual security profiles. |
|---|---|
| N | The specifications made on the Preset screens cannot be overwritten in any security profile. They will be valid for all libraries/users without exception. |
The preset values are described under User Preset Values and Library Preset Values respectively.
This option determines whether the database ID and file number of the current Natural
Security system file (FSEC) are to be displayed on the menu and selection screens within
the library SYSSEC.
| Y | The database ID and file number of the current Natural Security system file
(FSEC) will be displayed on the menu and selection screens within the library
SYSSEC. They will be displayed in the top right-hand corner below
the current date.
|
|---|---|
| N | The database ID and file number of the FSEC file will not be displayed in
SYSSEC.
|
This option determines how Natural Security reacts when you leave a function by pressing PF2, PF3, PF12 or PF15.
| Y | When you leave a function in Natural Security by pressing PF2, PF3, PF12 or PF15, a window will be displayed in which you have to specify whether the modifications you made before pressing the key are to be saved or not or whether you wish to return to the function. |
|---|---|
| N | When you leave a function by pressing PF2, PF3 or
PF15, the modifications you made before pressing the key will be
saved.
When you leave a function by pressing PF12, the modifications you made before pressing the key will not be saved. |
For details on the functions assigned to these keys, see the section PF-Keys.
This option allows you to ascertain who has modified which security profiles and Administrator Services settings.
"Modify" in this context comprises all maintenance functions applied to a
security profile (including Add, Copy, Delete, Link, etc.); it also includes the
transfer of a security profile with the programs SECULD2 and
SECLOAD.
| Y | Log records are written for modifications to security profiles and Administrator Services settings. |
|---|---|
| N | Modifications are not logged. |
When you set this option to Y, a window will be displayed in which you
can specify the following:
| Log file DBID/FNR |
The database ID and file number of the file in which the log records are to be stored. This file must have been loaded, as described in the installation documentation for Natural Security. On z/OS platforms, the FDT of this file must have been loaded using the appropriate installation job provided with System Maintenance Aid. On non-z/OS platforms, it must have been created with the Natural utility SYSPCI: In SYSPCI, select the product Natural Security and then the option Create new Adabas file. Note Should the log file become inaccessible, and prevent you from deactivating
the logging of maintenance functions, you can use the Natural system command
//CMSYNIN DD * R,A old-DBID,old-FNR,new-DBID,new-FNR |
| Logging even if no actual modification |
|
| Logging of changes to |
Possible values: You mark with
(*) "Administrator Services settings" in this context means all functions listed on the Administrator Services Menu (except Application Programming Interfaces). Related Profiles
Whenever a security profile is modified, Natural Security automatically adjusts related security profiles to ensure the consistency of all Natural Security definitions. For example, if you modify a group profile to remove a user from the group, Natural Security will automatically modify the user security profile to remove that group from the list of the user’s Privileged Groups, if necessary. These automatic adjustments of related profiles are also logged. Utility Profiles
Modifications to utility security profiles are not logged separately. Instead, default profiles and templates are handled under "Administrator Services settings", library-specific utility profiles under "library security profiles", and user-specific and user-library specific utility profiles under "user security profiles". Extended Logging for User and Library Security
Profiles
You can mark "user security profiles" and "library
security profiles" with For user security profiles:
For library security profiles:
|
To change the above specifications once you have activated the writing of log records, you press PF4 on the Set General Options screen.
To view the log records, you use the function Maintenance Log Records (see below).
This option can be used to store some Natural Security data on separate system files.
| Y |
The following data can be stored on separate system files:
If you set this field to On z/OS platforms, the FDTs of these files must have been loaded using the appropriate installation job provided with System Maintenance Aid. On non-z/OS platforms, these files must have been created with the Natural utility SYSPCI: In SYSPCI, select the product Natural Security and then the option Create new Adabas file (but not the Initialize option!). |
|---|---|
| N | All Natural security data are stored on the same FSEC system file. |
Note
If you use an Adabas utility to change the database ID or file number of one of
these system files, you have to set this field to N before the change, and
then set it to Y again after the change to make the new system file known to Natural
Security.
This option determines how Natural Security reacts in a situation in which two administrators simultaneously modify the same security profile. Such a situation would occur as follows:
Administrator 1 invokes a security profile for modification.
Administrator 2 invokes the same security profile for modification.
Administrator 1 leaves the function after having made his/her modifications - the modifications are applied to the security profile. This means that, at this point, Administrator 2 is working on data which are "out of date", but is not aware of this fact.
Administrator 2 leaves the function after having made his/her modifications. Now there are two possible reactions by Natural Security:
The modifications made by Administrator 2 are applied - unknowingly overwriting the modifications made by Administrator 1.
Administrator 2 receives a window, informing him/her that the security profile in question was in the meantime modified by another administrator. He/she can then contact the other administrator to discuss the changes made, and can then decide to either cancel his/her own modifications or apply them, thus overwriting the modifications made by Administrator 1.
This option determines which of these two reactions is to be taken; that is:
| Y | The modifications will be applied in any case. |
|---|---|
| N |
A window will be displayed in which the administrator can choose to:
|
This option only applies to concurrent modifications made to security profiles of users, libraries, special links and mailboxes.
This option determines whether private libraries are to be available in private mode or in public mode.
| Y | Private libraries are available in public mode. |
|---|---|
| N | Private libraries are available in private mode for exclusive use by the users with the same IDs (not recommended). |
See Private Library in the section User Maintenance for further information. Please read that section before you set this option.
This option determines whether or not mailboxes are output in batch mode.
| Y | Mailboxes are not output in batch mode. |
|---|---|
| N | Mailboxes are output in batch mode. |
For information on mailboxes, see the section Mailboxes.
This option determines if Natural environments - that is, system-file combinations - are protected.
| N | Environments protection is not active: Users can access any environment. Natural Security will not perform any access-authorization checks regarding the environment. |
|---|---|
| Y | Environments protection is active: Users can only access environments for which security profiles are defined. By default, access to a library in a defined environment is allowed for all users. For individual libraries and users, you can disallow access to an environment. |
If you change the setting of this option, you have to restart your Natural session for the change to take effect.
For details on environment protection, see the section Protecting Environments.
This field determines whether the Natural Security data stored on this FSEC system file may be accessed from a Natural Security session running with another FSEC system file.
| N | The data cannot be accessed. |
|---|---|
| U | The data can be accessed via the application programming interfaces (APIs)
which are provided in the library SYSEXT. This only applies to APIs
where an FSEC system file can be specified.
|
This option is only relevant for the Natural Development Server (NDV). It controls how access to an NDV server is handled.
It is assumed that access to the operating system on which an NDV server is running is controlled by an SAF-compliant external security system. User authentication (verification of user ID and password) is performed by this external security system. After a successful authentication, it generates an accessor environment element (ACEE) for the user, which is available for subsequent authorizations.
| N | A user can access an NDV server either by using the ACEE generated by the external security system, or directly by using his/her Natural Security user ID and password. |
|---|---|
| Y | A user can access an NDV server only with the ACEE generated by the
external security system. Without an ACEE, access to an NDV server is not
possible. This ensures that the external security system's user authentication
cannot be bypassed.
If the user has an ACEE, no further authentication checks are performed when he/she logs on to the NDV server. |
This option may be used to detect unused user IDs, that is, user security profiles which have not been used for a long time. This may be helpful when you decide to delete user security profiles which are no longer used.
| N | Initial logons are not recorded daily. |
|---|---|
| Y | Each user's initial logon at the start of the Natural session is recorded
daily. The date of a user's most recent initial logon is displayed in his/her
security profile (by pressing PF16 on the main user security profile
screen).
Please note that only logons which occur while this option is active can be recorded. |
When this option is set to Y, you can use the application programming interface
NSCXRUSE to obtain a list
of users who have not logged on since a specified date.
This option determines whether or not the current Natural application's relevant
ON ERROR statement and/or error transaction will be processed in the
event of Natural errors NAT1700 (time
window exceeded) and NAT1701 (non-activity time limit exceeded).
The error transaction is determined by the value of Natural system variable
*ERROR-TA.
| N | When error NAT1700 or NAT1701 occurs, both the
application's ON ERROR statements and error transaction will be
ignored; Natural Security will perform a logoff, regardless of whether there is
any ON ERROR statement or error transaction.
|
|---|---|
| S | When error NAT1700 or NAT1701 occurs, the
application's relevant ON ERROR statement will be processed before
Natural Security performs a logoff. Any error transaction will be
ignored.
|
| E | When error NAT1700 or NAT1701 occurs, the
application's error transaction will be processed before Natural Security
performs a logoff. Any ON ERROR statement will be ignored.
|
| G | When error NAT1700 or NAT1701 occurs, the
application's relevant ON ERROR statement will be processed, and if
no ON ERROR statement is encountered, the error transaction will be
invoked, before Natural Security performs a logoff.
|
This option only takes effect on z/OS computers. On non-z/OS platforms, Natural
Security always reacts as if it had been set to G (regardless of the actual
setting).
This option determines the course of action to be taken in the case of a Natural
runtime error occurring within the ON ERROR condition of a startup
transaction (*STARTUP).
When a runtime error occurs within the ON ERROR condition of a startup
transaction, Natural's error processing might lead to the startup transaction being
executed again. This would cause an error-loop situation. To prevent such a loop, you
can set this option.
| Y | In the case of a runtime error caused by a startup transaction, a
LOGOFF command will be executed at the point when
the startup transaction would be due for execution in the course of Natural's
error processing.
|
|---|---|
| N | In the case of a runtime error caused by a startup transaction, the Natural
system variable *STARTUP will be set to blanks, and Natural's error
processing will proceed.
|
If no startup transaction is defined, this option has no effect.
This option determines the value of the Natural system variable *APPLIC-NAME.
| Y | *APPLIC-NAME contains the name of the library to which the
user is logged on, regardless of whether the user is logged on via a special
link or not.
|
|---|---|
| N | *APPLIC-NAME contains the name of the library to which the
user is logged on. If the user is logged on via a special link, it contains the
special-link name instead.
|
This option determines whether a user security profile can be deleted if the user is still specified either as owner in any security profile or as DDM modifier in any DDM/file security profile.
This option can only be set if owners are assigned to the Natural Security library
SYSSEC.
| N | Security profiles of users who are owners or DDM modifiers cannot be deleted. This ensures that the deletion does not cause any undesired owner or DDM modifier constellation. |
|---|---|
| O | Security profiles of users who are owners or DDM modifiers can be
deleted. They can only be deleted by administrators who are owners of the
library SYSSEC.
|
| A | Security profiles of users who are owners or DDM modifiers can be deleted. They can only be deleted by the administrator (or group of administrators) whose ID is specified in the field By Administrator. |
If this option is set to "O" or "A" and the security profile of a user is deleted, his/her ID is automatically removed from any security profiles where he/she is specified as owner or DDM modifier. Nonetheless, it may be advisable before the deletion to use the Cross-Reference User function to ascertain which profiles/DDMs would be affected, and after the deletion to make sure the changed owner/co-owner and DDM modifier/co-modifier configurations still suit your requirements.
This section describes the options available for the authentication type LDAP (Light Directory Authentication Protocol). Before you use these options, you should be familiar with the corresponding information in the Software GmbH security eXtensions (SSX) documentation.
An LDAP server is a server which uses the Light Directory Authentication Protocol. If user authentication it to be performed via an LDAP server, this requires that the SSX security libraries were installed as part of the Natural Security installation procedure.
User authentication via an LDAP server is possible for online and batch sessions on Linux
and Windows (including the Natural Development Server). It is activated by setting the
field Protection Level in the LDAP master security profile to
1 (see below).
If an LDAP server is to be used, it has to be defined to Natural Security by creating a security profile for it.
You can define the following types of LDAP security profiles:
a master profile,
an alternative profile,
multiple archived profiles.
By default, only one LDAP security profile - the master profile - can be defined. The master profile is the one for the LDAP server which is actually used for the authentication.
In addition to the master profile, you can define an alternative profile for another LDAP server. This alternative server will be used for the authentication in the following situations:
the server defined in the master profile is not available at authentication time, or
the authentication performed by the master server has failed.
Before you can define an alternative profile, you have to set the field Allow alternative
profile in the master profile to Y.
Both the master profile and the alternative profile, once defined, are either active or
not active. To activate them, you set the field Protection Level in
the LDAP master security profile to 1; to deactivate them, you set it to
0 (see below).
In addition to the master profile and alternative profile, you can define archived profiles, that is, further LDAP security profiles which will be archived and are inactive. This allows you to define additional LDAP servers for future use or for test purposes.
To invoke LDAP security profile maintenance:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
On this menu, select Authentication Options.
The Authentication Types selection list will be displayed, listing all existing LDAP security profiles.
The Pr Ty column indicates the profile type and activation status:
M1 = master profile - active.
M3 = master profile - active - Natural Security authentication
if LDAP fails.
A1 = alternative profile - active.
A3 = alternative profile - active - Natural Security
authentication if LDAP fails.
M0 = master profile - not active.
A0 = alternative profile - not active.
Ar = archived profile.
From this selection list, you invoke all functions to create and maintain LDAP security profiles, as described below.
To create a new LDAP security profile:
On the Authentication Types selection list, you press
PF4 or enter the direct command ADD.
A window will be displayed, in which you specify the following:
Profile type - When you create your first LDAP profile, you can specify whether you want it to be the master profile or to be archived.
If a master profile already exists, you can specify whether the new profile is to be the alternative profile or to be archived.
Profile ID - For an alternative or archived profile, you
have to specify an ID (for the master profile, the ID is always * LDAP
*).
Copy from * LDAP * - For an alternative or archived profile, you can choose to copy the components from the master profile.
The first screen of the LDAP security profile will be displayed.
The items you can define in it are described below under Components of an LDAP Security Profile.
To maintain an existing LDAP security profile:
On the Authentication Types selection list, you can invoke one of the following functions by marking a profile with one of the following function codes (possible code abbreviations are underlined) in column Co:
| Code | Function |
|---|---|
MO |
Modify security profile. |
DE |
Delete security profile. |
DI |
Display security profile. |
AR |
Archive security profile. |
RV |
Revive security profile. |
You can revive an archived profile as either master profile or alternative profile.
To revive an archived LDAP security profiles:
On the Authentication Types selection list, mark the profile
with function code RV.
The Revive Profile profile-ID screen will be displayed. Select one of the following options:
Revive as master profile - The current master profile will be archived, and the revived profile will become the new master profile.
The ID of the revived profile will become * LDAP *. When you
select this option, you will be prompted to specify the ID under which the old
master profile is to be archived.
Revive as alternative profile - The current alternative profile will be archived, and the revived profile will become the new alternative profile.
When you select this option, you will be prompted to specify the ID under which the revived profile is to be the new alternative profile, and the ID under which the old alternative profile is to be archived. The new IDs are optional, you can also keep the existing IDs.
Revive as master profile with exchange - The current alternative profile will be archived, the current master profile will become the new alternative profile, and the revived profile will become the new master profile.
The ID of the revived profile will become * LDAP *. When you
select this option, you will be prompted to specify new IDs for the other two
exchanged profiles. For the old master profile, you have to specify a new ID.
For the old alternative profile, this is optional, you can also keep the
existing ID.
The screens referring to the master profile are entitled General LDAP Options. The screens referring to an alternative or archived profile are entitled Profile profile-ID Options.
The items you can define as part of an LDAP security profile are described below. Some items can only be defined in the master profile; they apply to all profiles and will be displayed in alternative/archived profiles where applicable, but their settings can only be modified in the master profile.
| Field | Explanation | |
|---|---|---|
| LDAP Options 1 | ||
| Profile ID |
The Natural Security ID of the LDAP security profile. The ID of the master profile cannot be modified, it is always The IDs of alternative and archived profiles can be freely chosen and may be up to 8 characters long. You can change IDs when you archive and revive LDAP security profiles. |
|
| Profile name | You may specify a name for the profile, which may be up to 32 characters long. | |
| Authentication type | LDAP (cannot be
modified).
|
|
| Protection level |
Possible values:
|
|
| Allow alternative profile |
This field is only available in the master profile. If you want to be able to use an alternative profile in addition to the
master profile, set this field to |
|
| Error record if alternative used |
This field is only available if Allow alternative
profile (see above) is set to If you want a logon error record to be written every time the LDAP server
defined with the alternative profile is used for authentication instead of the
one defined in the master profile, you set this field to |
|
| Alternative profile / Archived profile | These fields indicate if the profile is an alternative or archived profile. They are only displayed where applicable. | |
| Natural Security system | FSEC (cannot be
modified).
|
|
| Support user names as IDs |
This option allows the logon using the user name (as specified in the user security profile) as user ID. This option has three prerequisites. If it is activated (by marking this
field with
If this option is used, the Natural system variable |
|
| NSC user ID |
This option controls the access of users not defined to Natural Security.
|
|
| Log file path |
The complete path to the file to which the log data are written if the logging of the LDAP-server communication is active. If the specified path contains the character string |
|
| Log level |
This field is used to activate the logging of the LDAP-server communication. Possible values:
For further information, see the Software GmbH security eXtensions (SSX) documentation. |
|
| LDAP Options 2 | ||
| LDAP host | The IP address or domain name of the LDAP server. | |
| LDAP port | The port number of the LDAP server. The default is 389. | |
| LDAP server type | The LDAP server type. Possible types are:
|
|
| SSL connection | Mark this field with X if the
LDAP connection is made via an SSL-secured port (by default, this is port 636).
You can mark either this field or the one below, but not both. |
|
| Start TLS connection | Mark this field with X to attempt
to set up an encrypted communication over the plain LDAP port if the LDAP server
supports this.
You can mark either this field or the one above, but not both. |
|
| Technical user support | On LDAP servers which do not support anonymous
requests, you can use the technical user credential files to search for and find
LDAP users securely. For information on technical user support, see
Creating Technical User Credential Files in the
Software AG Security eXtensions (SSX) documentation. The
function createTechUserCreds described in that documentation is
used to create the property and key-value files of a technical user. The paths
to these files have to be specified in the following fields:
|
|
| Path to output file | In this field, you specify the complete path to the file containing the "technical user's" user ID and encrypted password. | |
| Path to key file | In this field, you specify the complete path to the file containing the key value used to decrypt the "technical user's" password. | |
| Support AUTO=ON |
If this field is set to blank and the Natural session is started with
Mark this field with If this option is set, the "technical user" is checked against
the key value, and if the check is successful, the session will be started
with |
|
| LDAP Options 3 | ||
| Default domain | The default domain name. | |
| LDAP person DN | The Personal Bind Distinguished Name of the
node where the user entries are located.
Example:
where |
|
| Attribute name user ID | The attribute name which contains the user ID. | |
| Object class person | The object class which denotes a user. | |
To invoke this function:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
On this menu, select PF-keys.
The Set PF-Keys screen will be displayed.
On this screen, you can assign functions and names to keys, as described below.
Functions can be assigned to certain keys only. Names can be assigned to all keys.
The functions assigned to the following PF-keys cannot be modified:
| Key | Function | Explanation |
|---|---|---|
| PF01 | Help | If you press PF1 on any Natural Security screen, help information for that screen will be displayed. |
| PF02 | Previous Menu | This key returns you to the menu screen from which you have invoked the
current processing level.
By default, the modifications you made before leaving a function with PF2 will be saved; see also the general option Exit Functions with Confirmation above. |
| PF03 | Exit | This key causes a given processing level to be terminated and the screen of
the next higher processing level to be displayed.
By default, the modifications you made before leaving a function with PF3 will be saved; see also the general option Exit Functions with Confirmation above. |
| PF04 | Additional Options | On a security profile screen, you can press this key (instead of marking
the Additional Options field on the screen with Y) to display the
Additional Options selection window for a security
profile.
|
| PF05 | Various functions on different screens (as described where appropriate). | |
| PF06 | Flip | The PF-key lines at the bottom of the Natural Security screens display either PF-keys 1 to 12 or PF-keys 13 to 24. By pressing PF6, you can switch from one display to the other. |
| PF07 | Previous Page (-) | This key scrolls a displayed list one page backward. |
| PF08 | Next Page (+) | This key scrolls a displayed list one page forward. |
| PF12 | Cancel | This key causes a given processing level to be terminated and the screen of
the next higher processing level to be displayed.
By default, the modifications you made before leaving a function with PF12 will not be saved; see also the general option Exit Functions with Confirmation above. |
| PF13 | Refresh | This key undoes all modifications you have made on a screen but which have not yet been saved. The fields on the screen will be reset to the values they had before you changed them. |
| PF14 | (reserved for future use) | |
| PF15 | Menu | This key invokes the Natural Security Main Menu.
By default, the modifications you made before leaving a function with PF15 will be saved; see also the option Exit Functions with Confirmation above. |
| PF16 to PF17 | Various functions on different screens (as described where appropriate). | |
| PF18 | (reserved for future use) | |
| PF19 | First Page (- -) | This key scrolls a displayed list to its beginning. |
| PF20 to PF24 | (reserved for future use) |
Note
The CLR key has the same function as PF12.
You can assign a function to each of these keys yourself. The function assigned can then be invoked within Natural Security by pressing the appropriate PF-key (or PA-key).
One of the following functions can be assigned to a PF-key (or PA-key):
a Natural system command,
a Natural terminal command,
a Natural program.
To assign a function to a key, you enter a command or program name in the Function column of the Set PF-Keys screen next to a key number.
You may name all PF-keys, including those whose function assignments you cannot change. The names may be up to 5 characters long and can be entered in the Name column of the Set PF-Keys screen.
The assigned names will appear in the PF-key lines which are displayed at the bottom of each Natural Security screen:
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
Help PrevM Exit AddOp Flip - + Canc
|
If no name is displayed for a PF-key, this indicates that the function assigned to this key is not applicable to the screen displayed.
The lines display either the keys PF1 to PF12 or the keys PF13 to PF24. By pressing PF6, you can switch from one display to the other, and back again.
The Logon/Countersign Errors functions serve two purposes:
You can view logon errors, that is, unsuccessful attempts to log on to Natural.
You can view - and unlock - locked users, that is, users whose IDs have been made invalid due to logon or countersign errors (if the Lock User Option is active).
In General Options, you can specify the Maximum number of logon attempts by entering a number n in the range from 1 to 9 (the default is 5). Every time a user makes n consecutive unsuccessful logon attempts, the user will be "thrown out" and a logon error record will be written by Natural Security.
A logon error record contains detailed information on each of the n logon attempts that led to the record being written (for example, which user and library IDs were entered by the user). You can view these records with the Logon Error Processing functions. This serves the following purposes:
You can see whether unauthorized people have tried to gain access to Natural.
You can see what users do wrong when they try to log on. Users may then be informed how to log on correctly.
You can see whether users have been given the appropriate access rights. For example, a user may try to log on to an library he/she is not - but should be- allowed to use. You can then make the necessary adjustments to the security profiles and links concerned.
The recording by Natural Security of logon errors cannot be switched off.
Natural Security also records unsuccessful attempts to access a Natural utility. These utility access error records can also be viewed with the Logon/Countersign Errors functions.
Note
The term logon errors (records) as used in the text below also comprises
utility access errors (records), unless explicitly indicated
otherwise.
If the Lock User Option (see General Options) is active, users may be "locked" due to logon or countersign errors:
Logon errors:
Once a user has reached the maximum number of logon attempts without entering the
correct password, the user will be locked.
Countersign errors:
After entering too many invalid passwords on a countersignature screen, the user
who invoked the function requiring the countersignatures will be locked. (For
information on countersignatures, see the section Countersignatures.)
With the function List/Unlock Locked Users you can see which users have been locked due to logon or countersign errors. You can also unlock them again.
Countersign errors are only recorded if the Lock User Option is active, whereas logon errors are always recorded (regardless of the Lock User Option).
To invoke Logon/Countersign Errors:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
On this menu, select Logon/countersign errors.
The Logon/Countersign Errors Menu will be displayed. It provides the following functions:
List error records
Delete error records
Display individual error records
List/unlock locked users
The individual functions are described below.
When selecting one of these functions, you can specify the following options:
| Option | Explanation | |||||
|---|---|---|---|---|---|---|
| Order of Records | This option determines the order in which the logon error records will be listed: | |||||
| T | The records will be in order of terminal IDs (as defined by
the Natural system variable *INIT-ID. For logon errors related to
Natural RPC and Natural Web I/O service requests, RPCSRVRQ and
NWOSRVRQ respectively will be used instead of the
*INIT-ID value).
|
|||||
| TY | Same as T for utility access error records
only.
|
|||||
| P | The records will be in order of user IDs (as defined by the
Natural system variable *INIT-USER).
|
|||||
| PY | Same as P for utility access error records
only.
|
|||||
| D | The records will be listed in order of dates (that is, the dates when the errors occurred). | |||||
| DT | Same as D, and evaluating the Start Value
field to restrict the list to certain terminal IDs
(*INIT-ID).
|
|||||
| DP | Same as D, and evaluating the Start Value
field to restrict the list to certain user IDs
(*INIT-USER).
|
|||||
| This option has no impact on the List/Unlock Locked Users function. | ||||||
| Start Value |
If you wish to list not all, but only a certain range of logon error records or locked users, you can specify a start value. For possible options, enter a question mark (?) in this field. Special start values (for Order of Records = T):
This field is ignored for Order of Records = D. |
|||||
| Date from ... to |
You can use these two fields if you wish to list only records of logon/countersign errors which occurred on a certain date or within a certain range of dates. For possible selection options, enter a question mark (?) in one of the fields. If Date from contains a wildcard (*, >, or <), the following applies:
Special values for Date from:
|
|||||
| Time from ... to |
You can use these two fields if you wish to list only records of logon/countersign errors which occurred in a specific period of time. For possible selection options, enter a question mark (?) in one of the fields. If the field Date from contains a specific date, the Time from value refers to the time on this date. If Date to contains a specific date, the Time to value refers to the time on this date. If Time from contains a wildcard (*, >, or <), Date to and Time to are ignored. |
|||||
| FUSER DBID/FNR |
If you wish to list only records of logon errors which occurred in conjunction with logon attempts to a specific FUSER system file, you specify its database ID and file number in these fields. |
|||||
This function displays a list of logon error records.
The list can be scrolled as described in the section Finding Your Way In Natural Security.
You can change the range of error records listed by entering selection criteria in the input fields above the list. For possible options, enter a question mark (?) in the respective input field(s).
In addition, the following special PF-key functions are available:
| Key | Explanation |
|---|---|
| PF06 | List only utility access error records. (Press again to revert to the list of all error records.) |
| PF09 | List the error records sorted by terminal ID
(*INIT-ID).
|
| PF10 | List the error records sorted by user ID (*INIT-USER).
|
| PF11 | List the error records sorted by date. |
To display detailed information on an error record, you mark it with code
DI. The Error History of the selected error will be
invoked (as with the Display Individual Error Records function; see
below).
This function displays a list of logon error records, like the List Error Records function described above. The options for handing the list are same as for the List Error Records function. In addition, you can delete logon error records.
It is recommended that logon error records be deleted periodically to save space on the FSEC system file.
To delete individual error records, you mark them with code DE.
To delete all error records displayed on the current page, you press PF4.
To delete all existing error records, you use the direct command
ERRDEL (see below).
To selectively delete large numbers of error records, you can use the application
programming interface NSCADM.
If an error record has been deleted, this will be indicated by ## in the
first column of the list.
To delete all logon/countersign error records at once, you enter the direct
command ERRDEL in the command line.
This function displays the Error History of logon error records one by one.
To delete an error record, you press PF4 on its Error History screen.
This function is only applicable if the Lock User Option (see General Options) is active. It displays a list of those users whose security profiles have been "locked" due to logon or countersign errors. The list is in alphabetical order of user IDs. On the list you can then unlock individual users.
When you invoke the List/Unlock Locked Users function, the List Locked Users screen will be displayed.
The list can be scrolled as described in the section Finding Your Way In Natural Security.
You can change the range of users listed by entering selection criteria in the input fields above the list. For possible options, enter a question mark (?) in the respective input field(s).
The column Lock of the List Locked Users screen indicates the type of error which caused the user to be locked:
| Type of error | Information displayed next to the type |
|---|---|
| C = Countersign error | The ID of the owner whose password was entered incorrectly, and the ID of the object which the locked user attempted to modify. |
| L = Logon error | The error numbers. |
| X = Logon of user after his/her user ID was automatically unlocked. | One of the above, depending on the original type of error. |
For information on automatic unlocking, see the option Automatically unlock users after in User Preset Values.
The following functions are available by marking an entry on the List Locked Users screen with one of the following function codes:
| Function code | Function |
|---|---|
DI |
Display more detailed information on an entry. |
UL |
Unlock a user. A window will be displayed in which you
confirm the unlocking by entering a Y. (Not applicable to errors of
type X.)
|
DE |
Delete entry. (Only applicable to errors of type
X.)
|
Note
You can also use the function Modify
User (see User Maintenance) to unlock a locked
user.
Logon records allow you to see which users have been using which libraries.
You can specify the option Logon recorded in the security profile of each library and each user (see the sections Library Maintenance and User Maintenance respectively).
A logon record will be written by Natural Security:
every time a user logs on to a library in whose security profile the Logon
recorded option is set to Y;
every time a user in whose security profile the Logon recorded
option is set to Y logs on to any library.
If the general option Transition
Period Logon is set to Y, a logon record will
also be written every time an undefined user logs on (regardless of the setting of the
option Logon recorded), and every time a user logs on to an undefined
library.
If the user security profile item ETID is set to S in
the User Preset
Values, a logon record - with time-stamp-related ETID - will also
be written every time a user logs on to Natural (this is only possible if the FSEC system
file is not read-only). In this case, however, the logon record only tells you which ETID
was used by which user ID, but it contains no library information.
Similarly, an access record will be written by Natural Security every time a users
invokes a utility in whose default security profile the option Access recorded is set to
Y.
You may view these logon/access records by using the "Logon records" functions.
Note
Unless explicitly indicated otherwise, the term "logon records" as used
in the text below means both logon records and access records.
To invoke Logon Records:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
On this menu, select Logon Records.
The Logon Records Menu will be displayed. It provides the following functions:
List logon records
Delete logon records
Delete logon records but last
The individual functions are described below.
When you select one of these functions, you can specify the following selection options:
| Option | Explanation | |||||
|---|---|---|---|---|---|---|
| Order of Records | U | List logon records in alphabetical order of user IDs. | ||||
| UX | Same as U, but listing only logon records of
undefined users.
|
|||||
| L | List logon records in alphabetical order of library IDs. | |||||
| LX | Same as L, but listing only logon records to
undefined libraries.
|
|||||
| Y | List utility access records in alphabetical order of utility names. | |||||
| UY | List utility access records in alphabetical order of user IDs. | |||||
| LY | List utility access records in alphabetical order of library IDs. | |||||
| UE | List ETID-related logon records in alphabetical order of user IDs. | |||||
| EU | List ETID-related logon records in ascending order of ETIDs. | |||||
| D | List logon records in chronological order of the date/time when the logons occurred. | |||||
| Start Value |
If you wish to list not all, but only a certain range of logon records, you can specify a start value. For possible options, enter a question mark (?) in this field. |
|||||
| ETID Start Value |
In this field you can specify a start value in hexadecimal format (for Order
of Records = |
|||||
| Date from ... to |
You can use these two fields if you wish to list only logon records of logons which occurred on a certain date or within a certain range of dates. For possible selection options, enter a question mark (?) in one of the fields. If Date from contains a wildcard (*, >, or <), the following applies:
Special values for Date from:
|
|||||
| Time from ... to |
You can use these two fields if you wish to list only logon records of logons which occurred in a specific period of time. For possible selection options, enter a question mark (?) in one of the fields. If the field Date from contains a specific date, the Time from value refers to the time on this date. If Date to contains a specific date, the Time to value refers to the time on this date. If Time from contains a wildcard (*, >, or <), Date to and Time to are ignored. |
|||||
| FUSER DBID/FNR |
If you wish to list only logon records of logons to a specific FUSER system file, you specify its database ID and file number in these fields. |
|||||
This function displays a list of logon records.
The list can be scrolled as described in the section Finding Your Way In Natural Security.
You can change the range of logon records listed by entering selection criteria in the input fields above the list. For possible options, enter a question mark (?) in the respective input field(s).
In addition, the following special PF-key functions are available:
| Key | Explanation |
|---|---|
| PF06 | List only utility access records. (Press again to revert to the list of all logon records.) |
| PF09 | List the logon records sorted by user ID. |
| PF10 | List the logon records sorted by library ID. |
| PF11 | List the logon records sorted by date. |
This function displays a list of logon records, like the List Logon Records function described above. The options for handing the list are same as for that function. In addition, you can delete logon records.
It is recommended that logon records be deleted periodically to save space on the FSEC system file.
To delete individual logon records, you mark them with code DE.
To delete all logon records displayed on the current page, you press PF4.
If you have invoked the Delete Logon Records function by pressing PF4:Del+ instead of ENTER on the Logon Records Menu, pressing PF4 on the list will automatically scroll to the next page immediately after the deletion, without your having to press PF8.
To delete all existing logon records, you use the direct command
LOGDEL (see below).
To selectively delete large numbers of logon records, you can use the application
programming interface NSCADM.
If a logon record has been deleted, this will be indicated by ## in the
first column of the list (except with PF4:Del+).
To delete all logon records at once, you enter the direct command LOGDEL in the
command line.
This function corresponds to the Delete Logon Records function described above. However, the only delete option available is to press PF4. If you do so, all logon records displayed on the current page will be deleted - except the latest entry for each user ID on the current page.
This set of functions can only be used if the general option Logging of Maintenance
Functions has been activated. If this option has been activated,
log records are written when security profiles and Administrator Services
settings are modified. The writing of log records allows you to ascertain who has modified
which security profiles and Administrator Services settings. "Modify" in this
context comprises all maintenance functions applied to a security profile (including Add,
Copy, Delete, Link, etc.); it also includes the transfer of a security profile with the
programs SECULD2 and SECLOAD.
To view the log records, you use the "Maintenance log records" functions.
To invoke these functions:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
On this menu, select Maintenance Log Records.
A menu will be displayed, from which you can select the following functions:
This function displays the following information:
for which types of objects log records are written,
the number of log records that have been written for each type of object,
whether the option "Logging even if no actual modification" is set or not.
Note
For this function, you only enter the function code; the other options on the menu
have no effect.
This function displays a list of the log records that have been written for modifications to Administrator Services settings.
| Menu Options for this Function | Explanation |
|---|---|
| Modifier | To list only the modifications performed by a specific administrator, you specify his/her user ID in this field. |
| Date from/to | By default, these fields both contain the current date; that is, only the log records written today are listed. To list older log records, you change the date values in these fields as desired. |
| Time from/to | To list only log records written within a certain period of
time, you specify the desired time range (format
hours:minutes:seconds) in these fields.
|
| Ascending/Descending | You can choose whether you want the log records to be listed in ascending or descending chronological order. |
Note
The other options provided on the menu are not applicable to this function; they
take no effect if specified.
On the list displayed, the following information is provided for each log record: the Administrator Services function performed, the ID of the user who made the modification, and the date and time of the modification.
On the list, you can mark a log record with any character: the screen on which the modification was made will then be displayed; on that screen, fields whose values were changed are displayed intensified. The screen also shows the Natural Security version and FSEC system file with/on which the modification was made.
This function displays the log records that have been written for modifications to security profiles.
| Menu Options for this Function | Explanation |
|---|---|
| Object type | In this field, you specify the type of object
(USer, LIbrary, etc.) whose modified security
profiles you wish to be listed. If you leave the field blank or enter a question
mark (?), a window will be displayed in which you can select the desired object
type. If you enter an asterisk (*), all log records for all security profiles
will be listed.
|
| Start value | In this field, you can enter an object ID as start value for the list to be displayed. |
| Modifier | To list only the modifications performed by a specific administrator, you specify his/her user ID in this field. |
| Date from/to | By default, these fields both contain the current date; that is, only the log records written today are listed. To list older log records, you change the date values in these fields as desired. |
| Time from/to | To list only log records written within a certain period of time, you
specify the desired time range (format hours:minutes:seconds) in
these fields.
|
| Function | By default, log records written for all maintenance functions performed are
listed. To list only log records written for a specific function (for example,
Modify, Delete. Rename), you specify the desired function is this field.
Functions can be abbreviated to the first two letters (for example,
MO for Modify). For a selection list of available functions, you
enter a question mark (?) in this field.
|
| Ascending/Descending | You can choose whether you want the log records to be listed in ascending or descending chronological order. |
| Display modification | With this option, you can display intensified the actual modifications that were made in the security profiles; same as PF2 on the security profile screen (see below). |
On the list displayed, the following information is provided for each log record: the function performed on the security profile, the ID of the security profile, the ID of the user who made the modification, and the date and time of the modification.
On the list, you can mark a log record with any character: the security profile in which the modification was made will then be displayed. If you press PF2 on the security profile screen, the fields whose values were changed will be displayed intensified (and, if applicable, a message will indicate whether an actual modification was made or not). The screen also shows the Natural Security version and FSEC system file with/on which the modification was made.
On z/OS and Open Systems, this function can only be used in batch mode.
This function allows you to write/read the contents of the log file to/from a work file.
Log records have to be written to a work file when the log file becomes full. Thus, the work file serves as an "archive" for the log records.
The work files to be used are Work File 1 and Work File 5. On Linux and Windows, Work File 5 must be a file with the extension ".sag".
The output reports will be written to the print files CMPRT01 and
CMPRT02.
When you invoke this function, you will be prompted to specify the database ID and file number of the log file. If you later wish to specify another log file, you press PF5 on the Log File Maintenance menu.
When you invoke this function, the Log File Maintenance menu is displayed, from which you can select the following functions:
| Code | Function | Explanation |
|---|---|---|
LI |
List Log Records | This function is used to list the contents of the log file. The output
contains the same information as displayed by the function List Security Profile
Maintenance Logs: a list of all modified profiles/settings, as well as every
profile concerned (indicating the profile components which were modified). The
output consists of two reports:
|
LX |
List Log Records Extended | Same as List Log Records - in addition, this function displays the additional data which are logged if extended logging is activated for user or library security profiles; see Extended Logging under Logging of Maintenance Functions. |
WR |
Write Log Records to Work File | This function is used to write log records from the log file to Work File 5 (without deleting them from the log file). |
WD |
Write Log Records to Work File and Delete | This function is used to write log records from the log file to Work File 5, and delete them from the log file. |
RA |
Read Log Records from Work File | This function is used to read log records from Work File 5 onto the log file. |
SA |
Scan Work File | This function is used to scan the contents of Work File 5. |
The Log File Maintenance function can also be invoked with the direct command
LOGFILE.
Possible object types to be entered on the Log File Maintenance menu are:
| Code | Object Type |
|---|---|
* |
all |
AD |
administration functions |
AA |
all (base and compound) applications |
AB |
base applications |
AC |
compound applications |
DD or FI |
DDMs/files |
LI |
libraries |
MA |
mailboxes |
US |
users |
For object-type codes of external objects, see Types of External Objects.
Other parameters that can be specified on the Log File Maintenance menu are:
| Parameter | Explanation |
|---|---|
| Start value | You can specify a start value for the objects to be written/read. |
| Date from/to | If you wish to process only log records that were created in a specific period of time, you can specify a range of dates in these fields. |
| Work File 1 | The name of Work File 1. |
| Work File 5 | The name of Work File 5. |
To write log records from the log file to Work File 5, the CMSYNIN batch
input file would contain the following commands:
LOGFILE FIN
The CMOBJIN batch input file might contain the following
specifications:
SYSSEC,DBA,PASSWORD 22,241 WR,US,,2002-07-01,2002-07-25
The first line must contain the library ID SYSSEC and the user ID and
password of the respective Natural Security administrator.
The second line must contain the database ID and file number of the log file from which the records are read.
The third line must contain the function code and object type (possible values are the same as on the Log File Maintenance menu) - optionally followed by various parameters (whose sequence and possible values correspond to those of the corresponding fields on the Log File Maintenance menu).
When you scan or read the work file, you have to specify the following parameter in the JCL:
WORK=((5),OPEN=ACC)
//DBA JOB DBA,CLASS=K,MSGCLASS=X
//**
//** WRITE LOGGING OF MAINTENANCE DATA TO WORK FILE 5
//** DELETE RECORDS FROM LOG FILE
//**
//NSCnnBAT EXEC PGM=NATBATnn,REGION=2400K,
// PARM=('IM=D,FNAT=(22,210),INTENS=1,FSEC=(22,240),',
// 'MT=0,MAXCL=0,MADIO=0,AUTO=OFF,WORK=((5),OPEN=ACC)')
//STEPLIB DD DSN=PRODNAT.LOAD,DISP=SHR
//DDCARD DD DISP=SHR,DSN=PRD.NATnn.JOBS(ADADB22)
//CMPRINT DD SYSOUT=X
//CMWKF05 DD DSN=NSC.LOG.WKF05,
// DISP=(NEW,CATLG),DCB=(RECFM=VB,LRECL=4624,BLKSIZE=4628),
// SPACE=(TRK,(5,2))
//CMSYNIN DD *
SYSSEC,DBA,password
LOGFILE
22,241
WD,US,,2002-07-01,2002-07-25
.
FIN
/*
//*
In the above example, the log records of all user security profiles modified between 1st and 25th July 2002 are written to Work File 5, and are then deleted from the log file.
//DBA JOB DBA,CLASS=K,MSGCLASS=X
//**
//** LIST LOG RECORDS-WRITE REPORTS OF MAINTENANCE DATA TO PRINTER
//**
//NSCnnBAT EXEC PGM=NATBATnn,REGION=2400K,
// PARM=('IM=D,FNAT=(22,210),INTENS=1,FSEC=(22,240),',
// 'MT=0,MAXCL=0,MADIO=0,AUTO=OFF')
//STEPLIB DD DSN=PRODNAT.LOAD,DISP=SHR
//DDCARD DD DISP=SHR,DSN=PRD.NATnn.JOBS(ADADB22)
//** CMWKF01 DD DISP=SHR,DSN=NSC.LOG.WKF01
//** CMWKF05 DD DISP=SHR,DSN=NSC.LOG.WKF05
//CMPRINT DD SYSOUT=X
//CMPRT01 DD SYSOUT=X
//CMPRT02 DD SYSOUT=X
//CMSYNIN DD *
LOGFILE
FIN
/*
//CMOBJIN DD *
SYSSEC,DBA,password
22,241
LI,AD,,2002-06-06,2002-06-06
LI,US,MILL*,2002-05-01,2002-05-31
.
/*
//*
In the above example, the log records of all Administrator Services settings modified
on 6th June 2002 and of all user security profiles modified in May 2002 are written to
the print files CMPRT01 (list of log records) and CMPRT02
(detailed log records information).
//DBA JOB DBA,CLASS=K,MSGCLASS=X
//**
//** READ LOGGING OF MAINTENANCE DATA FROM WORK FILE 5
//** INTO LOG FILE
//**
//NSCnnBAT EXEC PGM=NATBATnn,REGION=2400K,
// PARM=('IM=D,FNAT=(22,210),INTENS=1,FSEC=(22,240),',
// 'MT=0,MAXCL=0,MADIO=0,AUTO=OFF,WORK=((5),OPEN=ACC)')
//STEPLIB DD DSN=PRODNAT.LOAD,DISP=SHR
//DDCARD DD DISP=SHR,DSN=PRD.NATnn.JOBS(ADADB22)
//CMPRINT DD SYSOUT=X
//CMWKF05 DD DSN=NSC.LOG.WKF05,DISP=(SHR)
//CMSYNIN DD *
SYSSEC,DBA,password
LOGFILE
22,241
RA,US,,2002-07-01,2002-07-25
.
FIN
/*
//*
In the above example, the log records of all user security profiles modified between 1st and 25th of July 2002 are read from Work File 5 and thus restored on the log file.
See also the section Natural Security In Batch Mode.
Note
This function is independent of the logging of maintenance functions. Internally,
however, it uses the same log file.
This function evaluates the logon records that have been written by Natural Security (see Logon Records ). It allows you to ascertain:
when each user logged on last,
which users have not logged on within the last n days.
When you invoke the function, a window will be displayed in which you enter a number of days :
If you enter a 0, you will get a list of logon records
showing the latest logon record written for each user.
If you enter any other value n, you will get a list of logon records of those users who have not logged on in the last n days, showing for each of those users the last logon record written before the specified time interval.
The logon records are listed in chronological order.
Note
For this function, the fields Object Type, Start
Value and Date from/to on the menu have no
effect.
SAF Online Services provide several functions for monitoring the SAF server.
SAF Online Services are only available on z/OS computers; they are only available if Natural SAF Security (or any other SAF-related product) is installed.
Before you can use SAF Online Services, you have to define a utility security profile for the utility SYSSAFOS (which contains the SAF Online Services).
To invoke SAF Online Services:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
On this menu, select SAF Online Services.
The Online Services menu will be displayed, which provides the following functions:
This function displays the parameter settings as defined in the system parameter module. The following information is displayed:
| Item | Explanation |
|---|---|
| Authorization | Displays the different resource authorization checks performed by the SAF server that are related to Natural on z/OS, EntireX Communicator, Adabas, Entire Net-Work and Adabas SQL Server. |
| Class/Type | Shows the names of the different SAF general resources Classes or Types. These contain either the default or any override values which have been defined in the system parameter module. |
| Universal | This indicates a particular check is designated universal. If selected, then failure to define a particular resource profile will result in all users having access to it. Natural Program execution authorization cannot be designated universal. |
| Buffered | Displays for each type of check the maximum number of positive checks that the SAF server can buffer on behalf of each user. |
| Logging | This indicates the SMF logging level required when performing security
checks. 0 signifies logging ASIS, that is, in accordance with the
default for the security Class/Type; "1" indicates an override
setting of NONE.
|
| Active | Designates the particular authorization checks that are active. This applies only to checks performed by z/OS Natural as all other checks are activated by the installation process. |
| Env (Environment) | Indicates that an environment code, based on the Natural system files, is used to prefix certain resource profiles. Applies only to authorization checks performed by z/OS Natural. |
| Storage (k) | The size of the buffer in kilobytes which can be used for caching positive security checks in the address space of the SAF server. |
| Server DBID | Shows the database ID used by the SAF server. |
| Encrypt Req. | Indicates whether security requests passed between different SAF server components are communicated encrypted. |
| Encrypt Stg. | Indicates whether storage maintained within the Natural environment is kept in an encrypted state. |
| Messages | SAF server message level: Level 0 gives only error message,
"1" reports security violations, and "3" generates
an audit trail of all checks.
|
| Cmd Log | Indicates whether command logging is turned on. |
| Buffer | Indicates whether security checks will be cached by the SAF server. |
| JCL check | Indicates whether CA-JCL check processing is available within the Natural environment. |
| Prefix Prog | Indicates whether Natural program names are prefixed with the name of the current application library when performing authorization checks. Not applicable to Natural SAF Security. |
| Protect Obj | Indicates whether program objects are protected within the Natural environment. Users require ALTER access to a particular application in order to modify its program objects. Not applicable to Natural SAF Security. |
| Log SYSMAIN | Indicates whether logging of all SYSMAIN operation is required. Not applicable to Natural SAF Security. |
| SYSMAIN/Lib | Indicates whether authorization checks for SYSMAIN functions will include access to the relevant Natural application libraries. Not applicable to Natural SAF Security. |
| Cmd Line | Indicates whether the Natural command line is protected. Users require CONTROL access in order to enter commands in the Natural command line. |
| ETID | Indicates whether Natural will generate a unique ETID. |
| Edit/Lib | Indicates whether Natural will prevent editing of objects located in another Natural application library. Not applicable to Natural SAF Security. |
| Clear/Ed | Indicates whether Natural will clear the edit area when logging onto another Natural application library. Not applicable to Natural SAF Security. |
| Ext Name | Indicates whether Natural will take the user name from SAF. Specifically,
the field *USER-NAME will be taken from RACF or CA-ACF2.
|
| Ext Group | Indicates whether Natural will take the group name from SAF. That is, the
field *GROUP will be taken from RACF, CA Top Secret,
CA-ACF2.
|
| Log API | Indicates whether SMF logging is performed when executing the Natural API. |
| Env API | Indicates whether authorization checks performed by the Natural API will be prefixed by an environment code based on the Natural system files. |
This function displays statistical information on the SAF server. The following information is displayed:
| Item | Explanation |
|---|---|
| Authorization | Displays the different resource authorization checks performed by the SAF server related to Natural for z/OS, EntireX Communicator, Adabas, Entire Net-Work and Adabas SQL Server. |
| Check (+ve) | Indicates the number of authorization checks performed against the security system for each check type. The count indicates authorizations for which access was permitted and can include universal checks. |
| Check (-ve) | Indicates the number of authorization checks performed against the security system for which access was denied. |
| Check saved | Shows the number of authorization checks that were optimized by the SAF server because the result was already known. |
| Overwritten | Number of times positive authorization results were overwritten in the SAF server's cache because more recent information took its place in the buffer. Increase the number of items buffered if this count is excessive for any particular check type. |
| Lngth | Number of bytes reserved to cache resource profiles belonging to each type of authorization check. This value is generated automatically by the system. |
| Active Users | Number of users currently active in the SAF server. |
| High Watermark | High watermark value for number of users present in the SAF server. |
| Max Users | Maximum of users that can be accommodated. |
| Overwritten | Number of times a user area was reclaimed and allocated to another user. Increase the total buffer size if this count becomes excessive. |
| Authenticated | The total number of successful authentication checks performed. |
| Denied | The number of unsuccessful authentication checks. |
This function displays statistical information on the currently active users. The function displays a list of users. When you select a user from the list, statistical information on this user will be displayed. The individual items correspond to those of the same names as described above for System Statistics.
This function displays a list of ZAPs applied to the SAF server.
This function displays the storage of the SAF server's address space.
This function displays a list of the 256 most recent trace events.
This function is used to restart the SAF server. It ensures that all data held in the SAF server's own buffer are flushed, including the settings of NSF Options, the System Statistics, cached security checks and user information. In addition, any data held by the security system itself in the address space of the SAF server are flushed when this function is executed.
Before you use default profiles, you should be familiar with the "normal" way of defining users as explained in the section User Maintenance.
When you add new users, you can either type in every item of every user security profile by hand, or you can use a pre-defined user default profile as a template for the creation of a user security profile. When you have to define numerous users whose security profiles are to be very similar to one another, you can define in a default profile the items which are to be the same for many users, and then use this default profile as the basis for the individual security profiles. By using default profiles, you can thus reduce the amount of work required to define users to Natural Security.
You create a default profile as described below, and then use it as a template for a user security profile as described in the section User Maintenance.
To create a default profile:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
Press PF8.
On the Administrator Services Menu 2, select User Default Profiles.
The Default User Profiles selection list will be displayed.
In the command line of this screen, enter the command
ADD.
The Add User Default Profile window will be displayed.
In this window, enter the user ID and user type of the default profile.
For information on user IDs and user types, see the section User Maintenance.
The Add User Default Profile screen will be displayed.
On this screen you define a user default profile.
The Add User Default Profile screen corresponds more or less to the Add User screen for the same user type. The individual items you may define as part of a user security profile are described under Components of a User Security Profile. However, please note that you can define some items only in an individual security profile, but not in a default profile.
Default profiles are maintained like individual user security profiles (as described in the section User Maintenance).
When you add a new user, you can specify the ID of a default profile which is to be used as a template for the user security profile you are creating.
The user type of the default profile must be the same as that of the security profile you use it for.
When you use a default profile to add a new user, the items from the default profile are copied into the user security profile - except the user ID, user name and the owners.
In the user security profile, you can overwrite the items copied from the default profile, and specify further items.
Note
To define numerous users who are to have identical security profiles, you can also
use the "Multiple Add
User" function (which is described in the section User
Maintenance).
Before you use default library security profiles, you should be familiar with the "normal" way of defining libraries as explained in the section Library Maintenance.
When you add new libraries, you can either type in every item of every library security profile by hand, or you can use a pre-defined default library security profile as a template for the creation of a library security profile. When you have to define numerous libraries whose security profiles are to be very similar to one another, you can define in a default profile the items which are to be the same for many libraries, and then use this default profile as the basis for the individual security profiles. By using default library security profiles, you can thus reduce the amount of work required to define libraries to Natural Security.
You create a default profile as described below, and then use it as a template for a library security profile as described in the section Library Maintenance.
To create a library default security profile:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
Press PF8.
On the Administrator Services Menu 2, select Library Default Profiles.
The Default Library Profiles selection list will be displayed.
In the command line of this screen, enter the command
ADD.
The Add Default Library Profile window will be displayed.
In this window, enter the library ID of the default profile (for information on library IDs, see the section Library Maintenance).
The Add Default Library Profile screen will be displayed.
On this screen, you define a default library security profile.
The Add Default Library Profile screen corresponds more or less to the Add Library screen. The individual items you may define as part of a library security profile are described under Components of a Library Security Profile. However, please note that you can define some items only in an individual security profile, but not in a default profile.
Default profiles are maintained like individual library security profiles (as described in the section Library Maintenance).
When you add a new library, you can specify the ID of a default profile which is to be used as a template for the library security profile you are creating.
When you use a default profile to add a new library, the items from the default profile are copied into the library security profile - except the library ID, library name and the owners.
In the library security profile, you can overwrite the items copied from the default profile, and specify further items.
Before you start defining users to Natural Security, you can use this function to pre-define the values of several items that are part of a user security profile. When you then create a user security profile, the items in the profile you are creating are already pre-set to these values.
To invoke this function:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
Press PF8.
On the Administrator Services Menu 2, select User Preset Values.
The first Preset User Values screen will be displayed.
Preset User Values consists of three screens:
To navigate between them, you use PF7 (General options), PF8 (Password options) and PF9 (Password Phrase options).
All options are explained below.
Some of the options also appear in the security profile of every user, where their values
will be preset to those you specify on the Preset User Values screen.
If the general option Overwriting of defaults possible is set to
Y, you may overwrite these values in individual user security profiles.
Other options do not directly correspond to user security profile fields, but apply to
user security profiles in general.
Note
To ascertain in which user security profiles the value of a specific components
differs from the corresponding preset value, you can use the application programming
interface NSCADM.
| Item | Explanation | |
|---|---|---|
| ETID |
You may specify which value is to be used as ID for End of Transaction data (ETID). For Natural Security to be able to supply ETIDs, the Natural session must be
started with the Natural profile parameter |
|
S |
This setting applies to all users; it cannot be changed in individual user security profiles. An ETID for every user will be generated by Natural Security at the start of
his/her Natural session. Such an ETID consists of In the individual user security profiles, this is indicated by the
Default ETID field being prefixed with
To use a time-stamp-related ETID for a single user only, you specify
If time-stamp-related ETIDs are used, a logon record containing the ETID will be written by Natural Security every time a user logs on to Natural. To ascertain which ETID has been used by which user ID, you can view the logon records, or use the application programming interface NSCADM. See also Logon Records. For service requests in an RPC client/server environment, you can also use time-stamp-related ETIDs; see Components of an RPC Server Profile. Note |
|
F |
Same as |
|
G |
ETIDs will be generated by Natural Security during the logon procedure from the following components:
|
|
U |
The ID by which a user is defined to Natural Security, i.e. the value of the
Natural system variable If the Automatic Logon
feature (which is described in the section Logging On) is
used, the value of |
|
I |
The value of the Natural system variable
*INIT-USER will be used as ETID.
|
|
T |
The value of the Natural system variable
*INIT-ID will be used as ETID.
|
|
N |
ETIDs will not be used. | |
|
If you do not remember the possible values you may specify, enter a question mark (?) or an asterisk (*) in the field: a window will be displayed; in the window, mark the desired value with a character or with the cursor; the value will then be written into the ETID field. See the Natural System Variables documentation for details on the above-mentioned system variables. |
||
| Private library for administrator/person | Determines whether the user, if he/she is of type "Person" or "Administrator", may have a personal ("private") library. | |
| Password phrases active |
This option applies to user security profiles in general. Password phrases are passwords which are longer than 8 characters. This option enables the use of password phrases.
If this option is set to |
|
| Change password after nnn days |
You can specify a time interval (number of days) after which users are forced to change their passwords during the logon procedure. The maximum value is 365 days. To display a message to users warning them of their impending password expiration, you use the option Message before password expiration (see below). |
|
| Message before password expiration |
This option applies to user security profiles in general. You can use it to have a message displayed to users whose password is about to expire. The number you specify here determines how many days - possible values are 1 to 10 - before his/her password expiration is due a user is to a receive message, indicating that his/her password will expire. The message (NAT1691) will be displayed after the initial logon to Natural. This only applies to users in whose security profiles a time interval for password change is set (option Change after nnn days in a user security profile.) |
|
| Password change possible after |
This option applies to user security profiles in general. You can specify a time interval (nn hours, nn minutes) after which a user can change his/her password again. When a user has changed his/her password, he/she has to wait until the specified time has elapsed before he/she can change it again. |
|
| Automatically unlock users after |
This option applies to user security profiles in general. If the Lock User Option is active, users may be "locked" due to logon or countersign errors. To manually unlock a locked user, you use the function List/Unlock Locked Users. With this option, you can specify a time interval after which a locked user is unlocked automatically. In this case, a locked user ID will be unlocked nn hours and nn minutes after which the locking occurred. |
|
These options apply to "regular" passwords of up to 8 characters. For passwords which are longer than 8 characters, see Password Phrase Options below.
| Item | Explanation | |
|---|---|---|
| Minimum password length |
This option applies to user security profiles in general. A user password must not consist of fewer characters than the number specified here. Possible values: 1 - 8. When you set this length, please bear in mind that by default passwords are identical to user IDs (see the section User Maintenance). |
|
| Password case-sensitive |
This option applies to user security profiles in general. It determines whether or not Natural Security is to distinguish between lower-case and upper-case characters in user passwords:
Note |
|
| User password history |
This option can be used to exercise more control over the usage of passwords.
The activation of password history has the following effects:
|
|
The following options can only be used if
User Password History (see above) is set to
Y or *.
|
||
| Maximum number of stored passwords | This corresponds to the field in the User Password History activation window: The last nn passwords used by a user are recorded by Natural Security. They cannot be used again by the user. Possible values: 1 - 99. | |
| Password mask |
You can define a "mask" to which passwords must conform; that is, you can define for each position in a password what is has to consist of:
For example, The length of the mask must correspond to the Minimum Password Length (see above). |
|
| Each character only once | If this value is set to Y, passwords must
not contain a character twice.
For example, |
|
| Disallow double characters | If this value is set to Y, passwords must
not contain double characters.
For example, |
|
| Check password for pattern | If this value is set to Y, a password must
not be the same as the current value of the Natural system variable
*USER. Moreover, a new password must not be too similar to the
old one: a new password will be rejected if its last three characters are
identical to those of the old password.
|
|
The following options are only available if
Password
case-sensitive (see above) is set to Y. The sum of
these four values must correspond to the Minimum Password
Length (see above):
|
||
| Minimum no. of upper-case letters | In this field, you can specify how many upper-case alphabetical characters a password must contain at least. | |
| Minimum no. of lower-case letters | In this field, you can specify how many lower-case alphabetical characters a password must contain at least. | |
| Minimum no. of numeric characters | In this field, you can specify how many numeric characters a password must contain at least. | |
| Minimum no. of special characters | In this field, you can specify how many special characters a password must contain at least. | |
These options are only available if the general user security profile option Password phrases
active (see above) is set to Y or A.
They apply to password phrases, that is, passwords which are longer than 8
characters.
Note
Password phrases are always case-sensitive.
| Item | Explanation | |
|---|---|---|
| Minimum password phrase length |
This option applies to user security profiles in general. A password phrase must not consist of fewer characters than the number specified here. Possible values: 9 - 128. |
|
| User password phrase history |
This option can be used to exercise more control over the usage of password phrases.
The activation of password phrase history has the following effects:
|
|
The following options can only be used if
User Password Phrase History (see above) is set to
Y or *.
|
||
| Maximum number of stored passwords phrases | This corresponds to the field in the User Password Phrase History activation window: The last nn password phrases used by a user are recorded by Natural Security. They cannot be used again by the user. Possible values: 1 - 10. | |
| Blanks allowed within password phrase | If this value is set to Y, password phrases
may include blanks.
|
|
| Check password phrase for pattern | If this value is set to Y, a password phrase
must not contain the current value of the Natural system variable
*USER. Moreover, a new password phrase must not be too similar to
the old one: it will be rejected if its last three characters are identical to
those of the old one.
|
|
| Minimum no. of upper-case letters | In this field, you can specify how many upper-case alphabetical characters a password phrase must contain at least. | |
| Minimum no. of lower-case letters | In this field, you can specify how many lower-case alphabetical characters a password phrase must contain at least. | |
| Minimum no. of numeric characters | In this field, you can specify how many numeric characters a password phrase must contain at least. | |
| Minimum no. of special characters | In this field, you can specify how many special characters a password phrase must contain at least. | |
Before you start defining libraries to Natural Security, you can use this function to pre-define the values of several items that are part of a library security profile. When you then create a library security profile, the items in the profile you are creating are already pre-set to these values.
To invoke this function:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
Press PF8.
On the Administrator Services Menu 2, select Library Preset Values.
The Preset Library Values screen will be displayed, containing library security profile items.
With PF5, you can invoke another screen with further library options.
The items are explained below.
Some of these items also appear in the security profile of every library, where their
values will be preset to those you specify on the Preset Library
Values screen. If the general option Overwriting of defaults
possible is set to Y, you may overwrite these
values in the individual library security profiles. Other items do not directly
correspond to library security profile fields, but are options which apply to library
security profiles in general.
| Item | Explanation |
|---|---|
| Active cross-reference for Predict | Determines whether an active cross-reference in Predict is generated for a
library.
If you specify an asterisk (*) here, this applies to all libraries:
The generation of active cross-references will be determined by the value of
the Natural profile parameter |
| Logon recorded | Determines whether logons to a library are recorded. |
| Natural programming mode | Determines whether the programming mode can be changed with the Natural
profile/session parameter SM.
If you specify an asterisk (*)
here, this applies to all libraries: The programming mode will be determined
by the value of the Natural profile parameter |
| Restart | Determines whether an Adabas OPEN command with or without End of Transaction ID (ETID) is executed during the logon procedure. |
| Maintenance with Natural utilities | Determines who may maintain the contents of the library with Natural utilities. |
| Clear source area by logon | Determines whether the editor's source work area is cleared automatically when a user logs on from the library to another library. |
| Execute startup transaction in batch | Determines whether the startup transaction specified in the library security profile is executed in batch mode. |
| Steplibs |
Allows you to specify the libraries which are to be the steplib libraries for the library. You can specify the name of the first steplib in the Steplibs field on the Preset Library Values screen. To specify more than one steplib, enter an asterisk (*) in the field or press PF4: a window will be displayed in which you can specify up to 9 steplibs. |
| Profile parameters for undefined libraries |
This is an option which applies to undefined libraries in general. For libraries for which no security profiles have been defined yet, the following settings will be determined by the corresponding Natural profile parameters:
|
| RPC Server Session Options (Natural RPC Restrictions) | |
| Close all databases | Controls the logon-/logoff-dependent closing of databases opened by remote subprograms in a library. |
| Logon option | Determines which logon data are evaluated when a library is accessed via a Natural RPC service call. |
| Logon recorded | This is not only a preset value. It also applies as default value if the
corresponding field in the library security profile is set to *. If
this is the case, it determines whether access to a library is to be recorded or
not when the library is accessed via a Natural RPC service call.
|
| Lock user option |
For details on this feature, see also the Lock User Option under General Options. This is not only a preset value. It also applies as default value if the
Lock User option in the security profile of the Natural
RPC server is set to
|
With PF5 on the library security profile items screen, you can invoke another screen with these further library options:
This option applies to all libraries. It affects the way in which the Disallow/Allow Modules settings in library security profiles are evaluated.
| * | The evaluation of the Disallowed/Allowed settings
depends on the platform:
|
|---|---|
| L | The evaluation of the Disallowed/Allowed setting is
the same on any platform:
When a module is invoked for execution, the Disallowed/Allowed setting for this module in the current library's security profile is only evaluated if the module is contained in that library. Setting this option to |
This option can be used to prevent the inadvertent deletion/renaming of a library in the mapped environment of the Natural Development Server. It applies to the actions Rename and Delete in the context menu of the library node in the mapped environment (see Tree-View Actions in the section Protecting the Natural Development Server Environment and Applications).
| Y | The actions Rename and Delete are disabled. They cannot be selected from the context menu of the library node. |
|---|---|
| N | The actions Rename and Delete are available in the context menu of the library node. |
Note
Setting this option to Y cannot prevent that a library disappears from the tree
view if the objects it contains are deleted (either from within the library or with
utilities from outside the library).
This option can be used to suppress the execution of startup transactions for logons to libraries in a mapped environment on a Natural Development Server client (see also Map Environment and Library Selection in the section Protecting the Natural Development Server Environment and Applications
| Y | Startup transactions are not executed in a mapped environment. The name
of the startup transaction, as specified in the security profile of the
library to which a logon is performed, is not written into the Natural system
variable *STARTUP.
|
|---|---|
| N | The execution of startup transactions in a mapped environment is not restricted. |
This option only takes effect in mapped environments on Natural Development Server clients.
For Natural projects, NaturalONE supports two development modes: shared mode and private mode. This option determines how Natural Security controls the Natural server actions triggered by the Eclipse Navigator view actions used by the Natural projects.
| * | NaturalONE development modes are not supported by Natural Security. The actions are controlled by a number of library security profile and utility profile settings. |
|---|---|
| Y | NaturalONE development modes are supported by Natural Security. The
actions are controlled by development mode options, which you can set when you
enter a Y in this field and then press PF5.
For details, see Protecting the Navigator View in the section Protecting the Natural Development Environment in Eclipse. |
This option determines which types of clients are permitted to connect to the Natural Development Server:
| N | Only Natural for Windows (Natural Studio) clients are permitted to connect to the server. |
|---|---|
| O | Only NaturalONE clients are permitted to connect to the server. |
| A | Both Natural for Windows (Natural Studio) and NaturalONE clients are permitted to connect to the server. This is the default. |
| P | Natural for Windows (Natural Studio) and NaturalONE clients are not permitted to connect to the server. |
See also Starting the Natural Development Server in the environment-specific sections of the Natural Development Server documentation.
This option determines if the FDIC system file can be set in library security profiles and special-link profiles. It also determines if the FUSER system file and the Cross-reference option can be set in special-link profiles.
| N |
With this setting, the following applies:
|
|---|---|
| Y |
With this setting, the following applies: The FDIC file, the FUSER file, and the Cross-reference option can be set in both library security profiles and special-link profiles. |
The display of the corresponding fields in library security profiles and special-link profiles depends on how this option is set.
Once you set this option to Y, you can only reset it to N if no FDIC
specification exists in any library or special-link profile, and no FUSER
specification in any special-link profile.
For details on how to set the FUSER and FDIC files and the Cross-reference option, see Library File and General Options under Components of a Library Security Profile.
This option determines which user ID is passed to Adabas to be used as Adabas login ID.
| N |
The user ID contained in the Natural system variable
|
|---|---|
| Y |
The user ID contained in the Natural system variable
|
This option only takes effect in non-z/OS environments. In z/OS environments, the
*USER value is always used as Adabas login ID.
Note*USER is assigned to the Adabas Open command. If the user ID can be
changed during the login process, it is necessary to set NSC Library
Profile > Security Options > Close
Database by Logon to Y for non-RPC sessions and the option
Close All Databases to Y or F (Force)
for Natural RPC sessions.
This option assigns the NSC library ID as default library ID for an undefined user ID
that does not match the Natural Library ID naming convention. An NSC library security
profile defined as public library and a Transition Period Logon option set to
Y are required before you set this option.
Value = library ID (A8)
This function is used as part of the installation procedure for an initial installation of Natural Security. It allows you to automatically create library security profiles for system libraries (that is, libraries whose names begin with SYS) of Natural and its subproducts.
If you use this function, you have to set the Natural profile parameter
MADIO to a value of at least 2000.
You should not apply this function to SYS libraries containing Natural utilities, as it is recommended that utilities be protected as described in the section Protecting Utilities.
To define system libraries:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
Press PF8.
On the Administrator Services Menu 2, select Definition of System Libraries.
A list of the system libraries of Natural and all Natural subproducts installed at your site will be displayed. For each system library, a library-specific security profile is provided in which all the necessary components are already defined appropriately.
On the list, you can either mark with AD individual libraries to which
you wish their pre-defined profiles to be applied one by one, or you can choose to
have the pre-defined profiles applied to all product system libraries simultaneously
by marking the corresponding product with AD.
For further information, see the Natural Security installation description in the Natural Installation documentation.
This function is used to create library security profiles for undefined libraries, that is, libraries which exist on the current FUSER system file, but for which no library security profiles have been created.
This function corresponds to that provided by the SHOW
command, as described under Listing
Undefined Libraries in the section Library
Maintenance.
To define undefined libraries:
On the Main Menu, select Administrator Services.
If you are allowed access to Administrator Services, the Administrator Services Menu 1 will be displayed.
Press PF8.
On the Administrator Services Menu 2, select Definition of Undefined Libraries.
A list of all undefined will be displayed. It corresponds to the one you get when
you issue the command SHOW UNDF on the Library
Maintenance selection list.
Proceed as described under Listing Undefined Libraries in the section Library Maintenance.