バージョン 4.2.5
 —  Natural Security  —

Protecting External Objects

This section covers the following topics:


Types of External Objects

With Natural Security, you can control the use of various types of objects used by:

The term external objects used in the Natural Security documentation comprises all the object types listed below.

Predict Objects

The following are Predict object types (they are described in the Predict documentation):

The two-letter codes in parentheses are the corresponding object-type codes as used by some Natural Security functions.

注意:
For documentation objects of types "base application" and "compound application" (SY-B and SY-O), it is strongly recommended that instead of Natural Security's subsystem for external objects you use the application maintenance subsystem; see the section Protecting Natural Development Server Applications

Other Objects

The following types of objects are used by various other products (they are described in the corresponding product documentation):

The two-letter codes in parentheses are the corresponding object-type codes as used by some Natural Security functions.

Top of page

IDs for External Objects

IDs are used by Natural Security to identify external objects and their security profiles. The ID of an external object must be unique amongst all IDs of objects of the same type defined to Natural Security.

The length of the IDs and other naming conventions that may apply to external objects differ from object type to object type; please refer to the respective product documentation for information.

Asterisk Notation

For the ID of an external object, you can use asterisk notation: if you create a security profile for an external object and choose as ID a character string followed by an asterisk (*), the security profile will apply to all objects of that type whose IDs begin with that character string. For single objects (or ranges of objects) within such a range you may still define individual security profiles.

For example, you can create a security profile for a batch job with ID "ADAX", which will apply to batch job ADAX; moreover, you can create a security profile for a batch job with ID "ADA*", which will apply to all other batch jobs whose IDs begin with "ADA"; further, you can create a security profile for a batch job with ID "A*", which will apply to all other batch jobs whose IDs begin with "A"; and, you can also create a security profile for a batch job with ID "*", which will apply to all other batch jobs for which no individual security profiles are defined.

Top of page

Components of an External Object's Security Profile

The following type of screen is the "basic" security profile screen for an external object, which appears when you invoke one of the functions Add, Copy, Modify, Display for an external object's security profile:

11:31:46                    *** NATURAL SECURITY ***                 2008-10-31
                                 - Modify Dataset -                              
                                                                                 
                                                 Modified .. 2008-08-12 by SAG   
                                                                                 
  Dataset ........... XYZ.SYS.SOURCE                                             
                                                                                 
                                                                                 
  ------ Default Access -------                                                  
  N I Info                                                                       
  N R Read                                                                       
  N A Alter                                                                      
  N D Delete                                                                     
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
  Additional Options ... N                                                       
                                                                                 
                                                                                 
  Enter-PF13--PF14--PF15--PF16--PF17--PF18--PF19--PF20--PF21--PF22--PF23--PF24---
        Refr        Menu                                                       

This screen varies slightly from object type to object type.

The individual items you may define as part of an external object's security profile are explained below.

Default Access

In this column, you can allow/disallow general access methods for the external object. The possible access methods differ from object type to object type, as shown below:

Access to Predict Documentation Objects, External Objects and 3GL Libraries:
R   Read
A   Add
M   Modify
D   Delete
Access to Predict Functions:
E   Execute
Access to Batch Jobs:
I   Display
S   Submit
A   Alter
D   Delete
Access to Datasets:  
I Info
R   Read
A   Alter
D   Delete
Access to Nodes, Printers, VTAM Applications:
U   Use
Access to Operations:  
P   Passive
A   Active
Access to Volume Serials:
I   Info
C   Allocate
A   Alter
D   Delete

The individual access methods are the same as those described in the corresponding product documentation.

Mark with "Y" the access methods that are to be allowed; mark with "N" the access methods that are not to be allowed.

The access methods allowed/disallowed here will apply to all users for which no special access is defined via a link (for information on links, see Linking Users to External Objects below).

Additional Options

If you mark the field "Additional Options" on the basic security profile screen with "Y", a window will be displayed from which you can select the following options:

The options for which something has already been specified or defined are marked with a plus sign (+).

You can select one or more items from the window by marking them with any character. For each item selected, an additional window will be displayed:

Additional Option Explanation
Maintenance Information (display only) The following information is displayed:
  • the date and time when the security profile was created, the ID of the ADMINISTRATOR who created it, and (if applicable) the IDs of the co-owners who countersigned for the creation;

  • the date and time when the security profile was last modified, the ID of the ADMINISTRATOR who made the last modification, and (if applicable) the IDs of the co-owners who countersigned for the modification.

Security Notes   You may enter your notes on the security profile.
Owners   You may enter up to eight IDs of ADMINISTRATORs. Only the ADMINISTRATORs specified here will be allowed to maintain the security profile.

If no owner is specified, any user of type ADMINISTRATOR may maintain the security profile.

For each owner, the number of co-owners whose countersignatures will be required for maintenance permission may optionally be specified in the field after the ID.

For an explanation of owners and co-owners, see the section Countersignatures.

Top of page

Creating and Maintaining External Object Security Profiles

This section describes the functions used to create and maintain security profiles for external objects. It covers the following topics:

Invoking Maintenance for External Objects

On the Main Menu, enter code "M" for "Maintenance". A window will be displayed.

In the window, mark one type of external object with a character or with the cursor. The Maintenance selection list for the selected object type will be displayed.

From this selection list, you invoke all maintenance functions as described below.

Adding a New External Object

The Add External Object function is used to define external objects to Natural Security, that is, create security profiles for them.

In the command line of the external object Maintenance selection list, enter the command ADD.

A window will be displayed. In this window, enter an ID for the object.

The Add screen for the specified object type will be displayed. On this screen, you may define a security profile for the external object.

The individual items you may define on this screen and any additional windows that may be part of an external object's security profile are described under Components of an External Object's Security Profile above.

When you add a new external object, the owners specified in your own user security profile will automatically be copied into the external object's security profile you are creating.

Selecting Existing External Objects for Processing

When you invoke Maintenance for an external object, a list of all external objects of this type for which a security profile exists will be displayed.

If you do not wish to get a list of all existing external objects but would like only certain external objects to be listed, you may use the Start Value option as described in the section Finding Your Way In Natural Security.

On the Main Menu, enter code "M" for "Maintenance". A window will be displayed. In the window, mark one type of external object with a character or with the cursor (and, if desired, enter a start value). The selection list for the selected object type will be displayed; for example:

 13:11:23                   *** NATURAL SECURITY ***                 2008-10-31
                            - Dataset Maintenance -                            
                                                                                 
  Co Dataset                                                Message              
  __ ______________________________________________________ _____________________
  __ XYZ.S                                                                       
  __ XYZ.SYS                                                                     
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
  Command ===>                                                                   
  Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
        Help        Exit              Flip  -     +                       Canc  

The list can be scrolled as described in the section Finding Your Way In Natural Security.

The following maintenance functions are available for external objects (possible code abbreviations are underlined):

Code Function
CO Copy
MO Modify
RE   Rename
DE   Delete
DI Display
LU   Link user

The individual functions are described below.

To invoke a specific function for an external object, mark the object with the appropriate function code in column "Co".

You may select various objects for various functions at the same time; that is, you can mark several objects on the screen with a function code. For each object marked, the appropriate processing screen will be displayed. You may then perform for one object after another the selected functions.

Copying an External Object

The Copy function is used to define a new external object to Natural Security by creating a security profile which is identical to an already existing external object's security profile.

What is Copied?

All components of the existing security profile will be copied into the new security profile - except the owners (these will be copied from your own user security profile into the new security profile you are creating).

Any links that exist to the existing external object will not be copied.

How to Copy

On the Maintenance selection list, mark the external object whose security profile you wish to duplicate with function code "CO".

A window will be displayed. In the window, enter the ID of the new external object.

The Copy screen for the external object will be displayed showing the new security profile.

This screen and any additional windows that may be part of an external object's security profile as well as the individual items you may define or modify are described under Components of an External Object's Security Profile above.

Modifying an External Object

The Modify function is used to change an existing external object's security profile.

On the Maintenance selection list, you mark the external object whose security profile you wish to change with function code "MO". The Modify screen for the external object will be displayed.

This screen and any additional windows that may be part of an external object's security profile as well as the individual items you may define or modify are described under Components of an External Object's Security Profile above.

Renaming an External Object

The Rename function allows you to change the ID of an existing external object's security profile.

On the Maintenance selection list, you mark the external object whose ID you wish to change with function code "RE". A window will be displayed in which you can enter a new ID for the external object.

Deleting an External Object

The Delete function is used to delete an existing external object's security profile.

On the Maintenance selection list, you mark the external object you wish to delete with function code "DE". A window will be displayed.

When you delete an external object, all existing links to the external object will also be deleted.

If you mark more than one external object with "DE", a window will appear in which you are asked whether you wish to confirm the deletion of each external object's security profile with entering the object's ID, or whether all external objects selected for deletion are to be deleted without this individual confirmation. Be careful not to delete an external object accidentally.

Displaying an External Object

The Display function is used to display an existing external object's security profile.

On the Maintenance selection list, you mark the external object whose security profile you wish to view with function code "DI". The Display screen for the external object will be displayed.

The items displayed on this screen and any additional windows that may be part of a external object's security profile are explained under Components of an External Object's Security Profile above.

Top of page

Linking Users to External Objects

The access methods allowed/disallowed in an external object's security profile apply to all users who are not linked to the external object.

If you wish to allow an individual user more or less access methods, you can link the user to the external object and in the link's security profile define which access methods are to be available for this particular user. This means that by using links you may define for different users different access rights to the same external object.

Only users of types "Administrator", "Person" and "Group" can be linked to an external object. Administrators and Persons can be linked to an external object either directly or via a Group. "Members" and "Terminals" can be linked to an external object only via a Group; that is, they must be assigned to a Group, and the Group be linked to the external object.

Two functions are available to establish and maintain links between users and external objects:

Both functions are described below.

Linking a Single User to External Objects

The function "Link user to external objects" is used to link one user to one or more external objects.

On the User Maintenance selection list, you mark the user you wish to link with function code "LO".

A window will be displayed, in which you mark with the cursor or with a character the type of external object to which you wish to link the user. In addition, the window provides the following options:

Then, the Link User To External Objects selection list will be displayed, showing the list of objects. For example:

 16:04:48                   *** NATURAL SECURITY ***                 2008-10-31
                             - Link User to Dataset -                            
                                                                                 
  User ID .... AD          User Name .... ARTHUR DENT                            
                                                   Access                        
  Co Dataset                                       IRAD     Message              
  __ _____________________________________________ ________ _____________________
  __ XYZ.S                                         I_______                      
  __ XYZ.SYS                                       I_A_____                      
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
                                                                                 
  Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
        Help        Exit              Flip  -     +                       Canc   
  Command ===> _________________________________________________________________

The list can be scrolled as described in the section Finding Your Way In Natural Security.

On the list, you mark the external objects to which you wish to link the user.

In the "Co" column, you may mark each object with one of the following function codes (possible code abbreviations are underlined):

Code Function
LK   Link - The user may use the external object with a special security profile to be defined for the link; the link profile will take precedence over the external object's profile (see below).
CL   Cancel - An existing link will be cancelled.
DI Display Object - The object's security profile will be displayed.
DL   Display Link - The link security profile will be displayed.

You can mark one or more objects on the screen with a function code. For each object marked, the selected functions will then be executed one after another. When processing is completed, a message will be displayed stating the link situation now in effect between the user and each object.

Creating a Link Security Profile

If you mark an external object with "LK", you may define the security profile for this link on the screen which will be displayed. The default settings which will appear in the link security profile are taken from the security profile of the external object.

The items you may define as part of a link security profile correspond with the items you may define as part of an external object's security profile (see Components of an External Object's Security Profile above).

Instead of allowing/disallowing the access methods in the link security profile, you can also enter/delete the corresponding letter in the appropriate position in the Access column of the Link User To External Objects selection list.

Moreover, you have the option to set "Activation Dates" in the link security profile; these are in analogy to the Activation Dates in a user security profile (as explained under Components of a User Profile in the section User Maintenance).

Modifying a Link Security Profile

To modify an existing link security profile, you mark the respective external object with "LK" again on the Link User To External Objects screen to invoke the link security profile screen.

Linking Multiple Users to an External Object

The function "Link users to external object" is used to link one or more users to one external object.

On the Maintenance selection list of an external object, you mark the object to which you wish to link users with code "LU".

A window will be displayed, providing the following options:

Then, the Link Users To External Object selection list will be displayed. For example:

 13:21:12                   *** NATURAL SECURITY ***                 2008-10-31
                             - Link Users to Dataset -                           
                                                                                 
  Dataset ........... ABC.S                                                      
  Default Access .... I                                                          
                                                 Access                          
  Co User ID  User Name                        T IRAD     Message                
  __ ________ ________________________________ _ ________ _____________________  
  __ AD       ARTHUR DENT                      A I_A_____                        
  __ ADMIN1   BUNGALOW BILL                    A I_AD____                        
  __ ADMIN2   MARIA ALVAREZ                    P I_______                        
  __ ADMIN3   SARA SANDOVAL                    A I_______                        
  __ ADMIN4   ALOYSIUS PENDERGAST              A IRA_____                        
  __ ADMIN5   JACK SPARROW                     A __AD____                        
  __ ADSON    BRIAN OF NAZARETH                A I_______                        
  __ AGROUP   CUALQIER GRUPO                   G I__D____                        
  __ HC       HAGBARD CELINE                   P I_______                        
  __ KG       KARL GLOGAUER                    P IR______                        
  __ MW       MIA WALLACE                      A I_______                        
  __ NH       NATHANIEL HAWKEYE                A ___D____                        
                                                                                 
  Command ===> _________________________________________________________________ 
  Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
        Help        Exit              Flip  -     +                       Canc  

The list includes all users of types "Group", "Administrator" and "Person".

The list can be scrolled as described in the section Finding Your Way In Natural Security.

On the list, you may mark the users you wish to be linked to the external object.

In the "Co" column, you may mark each user with one of the following function codes (possible code abbreviations are underlined):

Code Function
LK   Link - The user may use the external object with a special security profile to be defined for the link; the link profile will take precedence over the external object's profile (see below).
CL   Cancel - An existing link will be cancelled.
DI   Display User - The user security profile will be displayed.
DL   Display Link - The link security profile will be displayed.

You can mark one or more users on the screen with a function code. For each user marked, the selected functions will then be executed one after another. When processing is completed, a message will be displayed stating the link situation now in effect between the user and each object.

Creating a Link Security Profile

If you mark a user with "LK", you may define the security profile for this link on the screen which will be displayed. The default settings which will appear in the link security profile are taken from the security profile of the external object.

The items you may define as part of a link security profile correspond with the items you may define as part of an external object's security profile (see Components of an External Object's Security Profile above).

Instead of allowing/disallowing the access methods in the link security profile, you can also enter/delete the corresponding letter in the appropriate position in the Access column of the Link Users To External Object selection list.

Moreover, you have the option to set "Activation Dates" in the link security profile; these are in analogy to the Activation Dates in a user security profile (as explained under Components of a User Profile in the section User Maintenance).

Modifying a Link Security Profile

To modify an existing link security profile, you mark the respective user/object with "LK" again on the Link Users To External Object screen to invoke the link security profile screen.

Top of page