Protecting DDMs On Mainframes

As explained in the section Natural Security On Different Platforms, the protection of DDMs with Natural Security is different on mainframe computers from that on other platforms. This section describes how to control the use of DDMs (files) on mainframe computers. The control of DDMs on other platforms is described in the section Protecting DDMs On UNIX, OpenVMS And Windows.

This section covers the following topics:

In Natural Security on mainframe computers, DDMs are called "files". To define DDMs to Natural Security, you use the File Maintenance functions of Natural Security.


Before You Begin

A DDM must have been generated (in Predict, or with the Natural utility SYSDDM), before it can be defined as a file to Natural Security.

Components of a File Profile

The following type of screen is the "basic" file security profile screen, which is displayed when you invoke one of the functions Add, Copy, Modify, Display for a file security profile:

 10:25:36                   *** Natural Security ***                 2020-09-09
                                  - Modify File -                                
                                                                                 
  File ID .. EMPLOYEES                         Modified .. 2020-09-09 by SAG     
  DBID .....    10                                                               
  FNR ......    16                                                               
  Status ... PUBL  (PUBL, ACCE, PRIV)                                            
                                                                                 
  -- DDM Modifiers --                                                            
     ________   _                                                                
     ________   _                                                                
     ________   _                                                                
     ________   _                                                                
     ________   _                                                                
     ________   _                                                                
     ________   _                                                                
     ________   _                                                                
                                                                                 
                                                                                 
  Additional Options ... N                                                       
                                                                                 
                                                                                 
  Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
        Help  PrevM Exit  AddOp       Flip                                Canc

The individual items you may define as part of a file security profile are explained below.

Field Explanation
File ID (display only) The ID by which the file is defined to Natural Security and for which a DDM exists in the Natural system file.

The file ID by which a file is defined to Natural Security must be identical to that of the DDM. A file ID may be up to 32 characters long and must be unique among all file IDs defined to Natural Security.

DBID / FNR (display only) The database ID and file number of the database file referenced by the DDM. These values are taken from the DDM and written into the security profile.
Status You may set the file status to one of the following:
  • PUBL = Public (not protected)

  • ACCE = Access (update-protected)

  • PRIV = Private (read- and update-protected)

When you create a file security profile, the file status will, by default, be set to PUBL. See File Status below for details.

DDM Modifiers   You may enter up to eight IDs of users; only these users will then be allowed to maintain the DDM in Predict (or with Natural's SYSDDM utility). If you do not specify any DDM modifier, the owners of the security profile (see Additional Options below) may maintain the DDM. If neither DDM modifiers nor owners are specified, maintenance of the DDM is not restricted.

Next to the ID of each DDM modifier, you may optionally specify a number from 1 to 3; this number determines how many of the other DDM modifiers specified must countersign for maintenance permission (the countersignature logic which applies to DDM maintenance permission is analogous to that of owners and co-owners as described in the section Countersignatures).

File Status

The file status of a file may be one of the following:

PUBL PUBLIC: The file is not protected. It may be read and updated by any library.
ACCE ACCESS: The file is protected as far as update is concerned. It may be read by any library. However, it may be updated only by libraries that have been linked to the file.
PRIV PRIVATE: The file is protected. It may be accessed only by libraries that are linked to it. A link to a PRIVATE file may be specified as "read"(that is, read only) or "update" (which implies read).

The check whether a program may use a file is done when the program is compiled.

The following diagram illustrates the possible relationships between libraries and files in dependence of the file type:

To allow a library access to a file with status PRIVATE or ACCESS, a link has to be established between the library and the file. For information on how to link libraries to files, see Linking Libraries to Files below.

Additional Options

If you mark the field Additional Options on the basic security profile screen with "Y", a window will be displayed from which you can select the following options:

  • Maintenance Information

  • Security Notes

  • Owners

The options for which something has already been specified or defined are marked with a plus sign (+).

You can select one or more items from the window by marking them with any character. For each item selected, an additional window will be displayed:

Additional Option Explanation
Maintenance Information (display only) The following information is displayed:
  • the date and time when the security profile was created, the ID of the administrator who created it, and (if applicable) the IDs of the co-owners who countersigned for the creation;

  • the date and time when the security profile was last modified, the ID of the administrator who made the last modification, and (if applicable) the IDs of the co-owners who countersigned for the modification.

Security Notes   You may enter your notes on the security profile.
Owners   You may enter up to eight IDs of administrators. Only the administrators specified here will be allowed to maintain this file security profile or link libraries to it. If no owner is specified, any user of type "Administrator" may maintain and link the security profile.

For each owner, the number of co-owners whose countersignatures will be required for maintenance/link permission may optionally be specified in the field after the ID.

For an explanation of owners and co-owners, see the section Countersignatures .

Creating and Maintaining File Profiles

This section describes the functions used to create and maintain file profiles. It covers the following topics:

Invoking File Maintenance

Beginn der AnweisungslisteTo invoke file maintenance:

  1. On the Main Menu, select Maintenance.

    A window will be displayed.

  2. In the window, mark the object type File with a character or with the cursor.

    The File Maintenance selection list will be displayed.

  3. From this selection list, you invoke all file maintenance functions as described below.

Selecting a File or DDM for Processing

When you invoke File Maintenance, a list of all files that have been defined to Natural Security will be displayed.

If you do not want a list of all existing files but would like only certain files to be listed, you may use the Start Value and Type/Status options as described in the section Finding Your Way In Natural Security.

On the Main Menu, select Maintenance. A window will be displayed.

In the window, mark the object type File with a character or with the cursor (and, if desired, type in a start value and/or file status). The File Maintenance selection list will be displayed:

 12:50:20                   *** Natural Security ***                 2020-09-09
                                - File Maintenance -                             
                                                                                 
  Co File ID                          Status Message                             
  __ ________________________________ ______ _____________________               
  __ ANGLOFILE                        PUBL                                       
  __ AUTOMOBILES                      PUBL                                       
  __ CLIENTES                         PUBL                                       
  __ DELINCUENTES                     PUBL                                       
  __ EMPLEADOS                        PUBL                                       
  __ FAHRZEUGE                        PRIV                                       
  __ FINANCE                          PUBL                                       
  __ IMPUESTOS                        PUBL                                       
  __ INVOICE                          PUBL                                       
  __ MITARBEITER                      PUBL                                       
  __ NAILFILE                         PUBL                                       
  __ NEWFILE                          PUBL                                       
  __ OLDFILE                          PUBL                                       
  __ OTRASCOSAS                       PUBL                                       
  __ PRO-FILE                         PUBL                                       
                                                                                 
  Command ===>                                                                   
  Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
        Help        Exit              Flip  -     +                       Canc 

For each file, the file ID and file status are displayed.

The list can be scrolled as described in the section Finding Your Way In Natural Security.

Status as Selection Criterion

If you wish to list only DDMs of a specific status, you can specify one of the following selection criteria in the Status field above the list:

PUBL All DDMs of status PUBLIC.
ACCE All DDMs of status ACCESS.
PRIV All DDMs of status PRIVATE.
DEFI Defined; that is, all DDMs of status PRIV, ACCE, and PUBL (*).
UNDF Undefined; that is, all DDMs whose status is not PRIV, ACCE or PUBL (*).
DDM All defined and undefined DDMs (*).
NDDM DDM security profiles for which no corresponding DDMs exist (*).

* This is not an actual DDM status, but for selection purposes only.

The default status for selection is DDM; that is, all DDMs will be listed.

Selecting a Function

The following file maintenance functions are available (possible code abbreviations are underlined):

Code Function
AD Add file
CO Copy file
MO Modify file
DE   Delete file
DI Display file
LL   Link libraries to file

To invoke a specific function for a file, mark the file with the appropriate function code in column Co.

You may select various files for various functions at the same time; that is, you can mark several files on the screen with a function code. For each file marked, the appropriate processing screen will be displayed. You may then perform for one file after another the selected functions.

Add File

This function is used to define DDMs to Natural Security, that is, create new file security profiles.

Beginn der AnweisungslisteTo do so:

  1. On the Main Menu, select Maintenance.

    A window will be displayed.

  2. In the window, mark object type File with a character, and enter UNDF in the Type/Status field (and, if desired, enter a start value).

    The File Maintenance selection list will be displayed, listing all files with file status "Undefined" (that is, all DDMs that have been generated but not yet been defined to Natural Security).

    The list can be scrolled as described in the section Finding Your Way In Natural Security.

  3. On the File Maintenance selection list, mark the DDM for which you wish to create a file security profile with function code AD.

    The Add File screen will be displayed.

  4. The individual items you may define on this screen and any additional windows that may be part of a file security profile are described under Components of a File Profile.

When you add a file, the owners specified in your own user security profile are automatically copied into the file security profile.

Copy File

This function is used to define a new file to Natural Security by creating a security profile which is identical to an already existing file security profile.

What is Copied?

All components of the existing security profile will be copied into the new file security profile - except:

  • the file number and database ID (these are taken from the DDM),

  • the owners (these will be copied from your own user security profile into the new file security profile).

Whether any links are copied depends on whether you choose to copy with or without links (see below).

How to Copy

  1. On the File Maintenance selection list, mark the file whose security profile you wish to duplicate with function code CO.

  2. A window will be displayed in which you specify the following:

    Field Explanation
    To file Enter the ID of the "new" file.
    With links Enter "Y" or "N". With this option, you can, in addition to the file profile, also copy its links; see Copying With Links below.
  3. The Copy File screen will be displayed, showing the new security profile.

    Its components you may define are described under Components of a File Profile.

Copying With Links

If you select With Links = N, any links of libraries to the existing file will not apply to the new file.

If you select With Links = Y, any links of libraries to the existing file are copied for the new file, and you have the option to cancel the links you wish not to apply for the new file. The procedure is as follows:

  1. Once you have made any changes to the copied file profile and then leave the Copy File screen by pressing PF3, a list of libraries is displayed: it contains all libraries linked to the existing file.

  2. On the list, you may mark individual libraries with CL to cancel any links you wish not to apply for the new file. All libraries you do not mark will automatically be linked to the new file in the same manner - read or update link - as the existing file.

Modify File

This function is used to change an existing file security profile.

Beginn der AnweisungslisteTo do so:

  1. On the File Maintenance selection list, mark the file whose security profile you wish to change with function code MO.

  2. The security profile of the selected file will be displayed.

    Its components which you may define or modify are described under Components of a File Profile.

Delete File

This function is used to delete an existing file security profile.

Beginn der AnweisungslisteTo do so:

  1. On the File Maintenance selection list, mark the file you wish to delete with function code DE.

  2. The Delete File window will be displayed.

    • If you decide against deleting the file security profile, leave the window by pressing ENTER without having typed in anything.

    • To delete the file security profile, enter the file's ID in the window to confirm the deletion.

When you delete a file, all existing links to the file will also be deleted.

When you delete a file security profile, the DDM itself will not be deleted. The file ID will remain in the File Maintenance selection list with the file status set to "Undefined".

If a DDM is uncataloged in SYSDDM, deleted with SYSMAIN, or scratched in SYSDIC (Predict), the corresponding Natural Security file profile will automatically be deleted.

If you mark more than one file with DE, a window will be displayed in which you are asked whether you wish to confirm the deletion of each file security profile by entering the file's ID, or whether all files selected for deletion are to be deleted without this individual confirmation. Be careful not to delete a file accidentally.

Display File

This function is used to display an existing file security profile.

Beginn der AnweisungslisteTo do so:

  1. On the File Maintenance selection list, mark the file whose security profile you wish to view with function code DI.

  2. The security profile of the selected file will be displayed. Its components are described under Components of a File Profile.

Linking Libraries To Files

To allow a library access to a file, a link has to be established between the library and the file.

Two functions are available to establish and maintain these links:

  • a Library Maintenance function to link one library to one or more files,

  • a File Maintenance function to link one or more libraries to one file.

Both functions are described below. Possible link types are summarized at the end of this section.

For information on links to private-mode libraries, see Private-Mode Libraries in the section Protecting the Natural Development Environment in Eclipse.

Linking a Single Library to Files

The Library Maintenance function "Link Library to Files" displays a list of files with file status ACCESS and PRIVATE. On the list you mark the files to which you wish to link the given library.

Beginn der AnweisungslisteTo do so:

  1. On the Library Maintenance selection list, mark the library you wish to link with function code LF.

  2. A window will be displayed, providing the following options:

    • Start value - You can enter a start value (as described in the section Finding Your Way in Natural Security) for the list of files to be displayed.

    • Selection criterion - N = none: all files will be listed; L = linked: only files to which the library is already linked will be listed; U = unlinked: only files to which the library is not yet linked will be listed.

  3. Then the Link Library To Files selection list will be displayed, showing the list of files.

    The list can be scrolled as described in the section Finding Your Way In Natural Security.

    In the Co column, you may mark each file with one of the following function codes (possible code abbreviations are underlined):

    Code Function
    RE   Read-Link - The library thus linked may only read the file, but not update it.
    UP   Update-Link - The library thus linked may read and update the file.
    CL   Cancel - An existing link will be cancelled.
    DI Display File - The file security profile will be displayed.

    You can mark one or more files with a function code.

  4. For each file marked, the selected functions will be executed one after another. When processing is completed, a message will be displayed stating the link situation now in effect between the library and each file.

Linking Multiple Libraries to a File

The File Maintenance function "Link Libraries to File" displays a list of libraries that have been defined to Natural Security. On the list you mark the libraries you wish to be linked to the given file.

Beginn der AnweisungslisteTo do so:

  1. On the File Maintenance selection list, mark the file to which you wish to link libraries with function code LL.

  2. A window will be displayed, providing the following options:

    • Start value - You can enter a start value (as described in the section Finding Your Way in Natural Security) for the list of libraries to be displayed.

    • Libraries/Private libraries - L = the list will include either all libraries including private ones (if private libraries are used in public mode) or all libraries except private ones (if private libraries are used in private mode); U = the list will include only users' private libraries.

    • Selection criterion - N = none: all libraries will be listed; L = linked: only libraries which are already linked to the file will be listed; U = unlinked: only libraries which are not yet linked to the file will be listed.

  3. Then the Link Libraries To File selection list will be displayed, showing the list of libraries.

    The list can be scrolled as described in the section Finding Your Way In Natural Security.

    In the Co column, you may mark each library with one of the following function codes (possible code abbreviations are underlined):

    Code Function
    RE   Read-Link - The library thus linked may only read the file, but not update it.
    UP   Update-Link - The library thus linked may read and update the file.
    CL   Cancel - An existing link will be cancelled.
    DI Display Library - The library security profile will be displayed.

    You can mark one or more libraries with a function code.

  4. For each library marked, the selected functions will be executed one after another. When processing is completed, a message will be displayed stating the link situation now in effect between the file and each library.

Possible Link Types

A link can only be established to a PRIVATE or ACCESS file. No link is required to read or update a PUBLIC file.

A link to a PRIVATE file can be specified as read-link (RE) or update-link (UP).

A link to an ACCESS file can only be specified as update-link (UP); no link is required to read an ACCESS file.

The following figure shows all possible link types: