RACF PERFORMANCE TUNING
|
|
|
- Justin Bradley
- 9 years ago
- Views:
Transcription
1 SHARE - August 2010 Robert S. Hansel Lead RACF Specialist - RSH Consulting, Inc. [email protected]
2 RSH PRESENTER Robert S. Hansel is Lead RACF Specialist and founder of RSH Consulting, Inc., a firm he established in 1992 and dedicated to helping clients strengthen their IBM z/os mainframe access controls by fully exploiting all the capabilities and latest innovations in RACF. He has worked with IBM mainframes since 1977 and in information systems security since Mr. Hansel began working with RACF in 1986 and has been a RACF administrator, manager, auditor, instructor, developer, and consultant. He has reviewed, implemented, and enhanced RACF controls for major insurance firms, financial institutions, utilities, payment card processors, universities, hospitals, and international retailers. Mr. Hansel is especially skilled at redesigning and refining large-scale implementations of RACF using rolebased access control concepts. He has also created elaborate automated tools to assist clients with RACF administration, database merging, identity management, and quality assurance. Contact and background information: [email protected] 2
3 OBJECTIVES Optimize Access Authorizations Expedite the Logon Process Minimize I/O Operations RACF, z/os, CICS, IMS, and DB2 are Trademarks of the International Business Machines Corporation 3
4 RACF AUTHORIZATION DECISION LOGIC Resource Class Active (& RACLISTed if Required) Yes PRIVILEGED or TRUSTED Started Task No 4 # = Return Code Yes 0 No 8 Fail AUTH / FASTAUTH Pre/Post-Processing Exits ICHRCX01-02 / ICHRFX01-04 Pass 0 No Action Global Access Table - Requested Allowed Access Yes 0 No 8 No Profile Found in Database (CDT DFTRETC=0/4/8 if No) No 4 0 Yes 8 No SECLEVEL, CATEGORY, & SECLABEL Match USERID Yes User "Owns" the Resource USERID = Dataset HLQ, Spool-Dataset, or VM Minidisk Yes 0 No A 4
5 RACF AUTHORIZATION DECISION LOGIC A Not Auth USERID in Access List - Requested Allowed Access Yes 0 Not Listed Not Auth Group(s) in Access List - Requested Allowed Access Yes 0 Not Listed Not Auth ID(*) in Access List - Requested Allowed Access Yes 0 Not Listed Requested Access UACC Yes 0 No OPERATIONS Authority Allows Access Yes 0 No Not Auth USERID, Group(s), ID(*) PROGRAM, TERMINAL, CONSOLE, or JESINPUT in Conditional Access List - Requested Allowed Access Yes 0 Not Listed 8 No Profile in WARN Mode Yes 0 5
6 RACF AUTHORIZATION DECISION LOGIC Deactivate unused classes (be mindful of POSITs when deactivating) Resource classes, including SECDATA & SECLABEL classes Global Access Table classes Make access list processing efficient Minimize the number of entries in access lists Grant end-user access via groups instead of USERIDs Minimize the number of group connects per user Remove redundant entries (e.g., access allowed equals UACC) Remove obsolete residual entries - run IRRRID00 Reduce reliance on OPERATIONS authority by implementing Storage Administration authorities FACILITY STGADMIN profiles DASDVOL profiles ALTER access to Catalogs Write efficient exit code Implement the Global Access Table 6
7 GLOBAL ACCESS TABLE Performance enhancement tool Grants immediate access without referring to the profile and without logging to improve performance Used to grant access to common shared resources GLOBAL Class Profile - Class name [ RDEF GLOBAL DATASET ] Members - resource/access [ ADDMEM('CTLG.USER'/UPDATE ) ] Resource Discrete or Generic - General Resource generic profile rules Need not match existing profiles Access-levels - ALTER CONTROL UPDATE READ NONE Special Variables - Used in resource names &RACUID &RACGPID Substitute with requesting user's USERID Substitute with user s current connect group 7
8 GLOBAL ACCESS TABLE Sample entries (DSMON Report) DATASET &RACUID.*.** ALTER DATASET &RACGPID.*.** UPDATE (avoid - unintended access) DATASET CATALOG.MASTER READ DATASET CATALOG.USER UPDATE DATASET ISPF.LIBRARY READ DATASET SDSF.LIBRARY READ DATASET SYS1.BRODCAST READ DATASET SYS1.HELP READ DATASET SYS1.MACLIB READ DATASET SYS1.RACF NONE (precludes access) DATASET SYS%.** READ (avoid - too broad) JESJOBS SUBMIT.*.&RACUID*. &RACUID READ JESJOBS CANCEL.*.&RACUID.* ALTER JESSPOOL *.&RACUID.** ALTER JESSPOOL *.*.$JESNEWS.** READ FACILITY STGADMIN.ARC.ENDUSER.** READ TSOAUTH JCL READ TSOAUTH RECOVER READ OPERCMDS MVS.MCSOPER.&RACUID READ 8
9 GLOBAL ACCESS TABLE Activated and managed via SETROPTS SETROPTS GLOBAL(class) NOGLOBAL(class) [ REFRESH ] Must be refreshed if updated Can be used for most resource classes Not checked in RACROUTE REQUEST=FASTAUTH processing Not checked in RACROUTE REQUEST=VERIFY processing for APPL, TERMINAL, JESINPUT, CONSOLE, APPCPORT, and SERVAUTH resources Keep list of entries short and efficient to minimize search Drawbacks Precludes logging (except SETR AUDIT(class) resource defines) Undermines protection if allows more access than profile UACCs 9
10 RACF PROFILE RETRIEVAL - LOGICAL GAT Access & In-Memory Profiles ICB L-3 A database read for: - Inventory Control Block (ICB) - Each Index Level Block (L-n) - Profile Block L-2 L-2 L-1 L-1 L-1 L-1 Profile Segment Profile Segment Profile Segment Profile Segment Profile Segment Profile Segment Data is written and retrieved in 4K blocks Individual profiles and profile segments can be greater than 4K in size and span multiple contiguous blocks, each of which requires I/O to fetch - keep profiles as small as possible 10
11 RESIDENT DATA BLOCKS RACF maintains buffers in ECSA to hold copies of most recently used blocks (index, BAM, and profiles) for processing Frequently used blocks tend to stay in these buffers Desired number of resident blocks is specified in the Database Name Table - ICHRDSNT AL1(1) CL44 RACF.PRIMARY CL44 RACF.BACKUP AL1(100) XL1 xx Number of databases Primary DB name Backup DB name # of Resident Data Blocks Flags Resource Managers RACROUTE Default/minimum number of blocks 10 / 0 Non-Sysplex (none for backup database) 50 / 50 Sysplex (+ additional 20% for backup database) Maximum number (recommended) Sysplex - first system to IPL sets number of blocks ECSA BUFFERS 4k Blocks RACF Database 11
12 DATABASE CACHING RACF Sysplex Data Sharing Uses coupling facility as large store-through cache - caches ICB, index, & data blocks Can improve performance for single system Enabled by ICHRDSNT flag on first database entry XL1 x0 No Sysplex XL1 x8 Sysplex without data sharing XL1 xc Sysplex with data sharing Coupling Facility Resource Manager (CFRM) sets cache policy Cache size Recommend enough to at least hold all index blocks and data blocks for non-racflisted resource classes To assist in calculating the coupling facility size for RACF, go to 12
13 RACLIST All profiles for a specified class are stored in a shared dataspace SETROPTS RACLIST(class), if RACLIST=ALLOWED in CDT RACROUTE REQUEST=LIST,GLOBAL=YES by certain applications CICS IMS DB2 MQSeries Updated with SETROPTS RACLIST(class) REFRESH RACLIST-required classes APPCSERV APPCTP CRYPTOZ CSFKEYS CSFSERV DEVICES DIGTCIRT DIGTNMAP FIELD IDIDMAP NODES OPERCMDS PROPCNTL PSFMPL PTKTDATA RACFHC RACFVARS RDATALIB SECLABEL SERVAUTH STARTED SYSMVIEW UNIXPRIV VTAMAPPL Considerations / Recommendations(*): APPL* CDT* DASDVOL DIGT Classes* DSNR FACILITY* JES classes LDAPBIND* LOGSTRM PRINTSRV* RRSFDATA* TSO classes* TERMINAL* SDSF SURROGAT 13 Resource Managers Data Space RACF Database REQ=AUTH RACLIST
14 RACGLIST CLASS Stores RACLISTed profiles in pre-processed form for quick reloading at IPL, RACROUTE REQUEST=LIST, and REFRESH During RACLIST REFRESH for z/os images sharing a database with Sysplex communications, first image fetches, merges, and stores a copy of processed member and grouping profiles for other images to simply retrieve and load Activated by class - profiles are class names SETROPTS CLASSACT( RACGLIST ) RDEFINE RACGLIST class-name Especially beneficial for CICS, IMS, & DB2 classes Updated by SETROPTS RACLIST(class) REFRESH RACLIST Ensure database has sufficient space for RACGLIST profiles Note: IPLs no longer cause refresh of RACGLISTed classes Data Space RACF Database RACGLIST 14
15 z/os UNIX IDENTITY MAPPING Mapping required when corresponding identity must be determined (e.g., Unix 'ls' command - display RACF USERID and Group for Unix Owner uid and Group gid) Options to avoid searching all user and group OMVS segments for each look-up request UNIXMAP Class Contains profiles in the form Unnn and Gnnn, where 'nnn' is a uid or gid Users and groups are 'permitted' access to signify uid and gid assignment Profiles are automatically maintained when OMVS segments are created or altered via RACF commands Class must be activated to be used for mapping Application Identity Mapping (AIM) Restructured database with mapping index structure Implemented using IRRIRA00 utility Replaces UNIXMAP profiles Enables use of UID(nnn) and GID(nnn) on SEARCH command Additionally, cache uid and gid mappings in VLF 15
16 VIRTUAL LOOKASIDE FACILITY (VLF) VLF can cache RACF information for reuse Accessor Environment Elements (ACEEs) Group tree z/os Unix mappings of uids and gids to USERIDs and Groups z/os Unix User Security Packets (USPs) MAXVIRT - VLF Maximum Virtual Storage Optionally specified in PARMLIB(COFVLFxx) for each VLF CLASS MAXVIRT(nnnnnn) - 4K block increments Default: 4096 Range: Monitor VLF use - SMF record type 41, subtype 3 Default normally sufficient 16
17 VIRTUAL LOOKASIDE FACILITY (VLF) Accessor Environment Elements (ACEEs) Created during logon process - contains user's attributes, groups, and logon characteristics (e.g., Point-of-Entry (POE), application) Caching avoids repeated retrieval of user profile for subsequent logons PARMLIB(COFVLFxx) entry CLASS NAME(IRRACEE) EMAJ(ACEE) Altering a user profile causes purge of all cached ACEEs for that user Refresh of logon-related classes causes purge of all cached ACEEs Group tree Used to determine scope-of-groups for Group-level authorities SPECIAL OPERATIONS AUDITOR Caching avoids repeated retrieval of group profiles and tree reconstruction Implement only if group authority is used extensively PARMLIB(COFVLFxx) entry CLASS NAME(IRRGTS) EMAJ(GTS) 17
18 VIRTUAL LOOKASIDE FACILITY (VLF) z/os Unix mappings of uids and gids to USERIDs and Groups Caching avoids repeated retrieval of mapping information Needed even with AIM restructured database PARMLIB(COFVLFxx) entry CLASS NAME(IRRGMAP) EMAJ(GMAP) CLASS NAME(IRRUMAP) EMAJ(UMAP) z/os Unix User Security Packets (USPs) Created when user dubs (invokes z/os Unix function) Caching avoids repeated rebuilding of USPs during subsequent dubbing Especially helpful for applications using thread level security PARMLIB(COFVLFxx) entry CLASS NAME(IRRSMAP) EMAJ(SMAP) 18
19 DATABASE REORGANIZATION Over time, administrative actions have the following effect Index entry additions and profile expansions fill a block to overflowing requiring a block split Profile and segment deletions empty all but small percentage of a block, wasting both database and buffer space Newly added profile segments get stored in different blocks than the related profile requiring more I/O to fetch, especially during logon Creating and deleting profiles causes fragmentation of free space making it difficult for RACF to find contiguous blocks for storing large profiles IRRUT400 utility - reorganizes the database - run periodically Aligns index and associated profile blocks in sequential order Fills in data blocks eliminating wasted space and fragmentation Optionally places all profile segments in same block when possible Compresses the index and corrects upper level index errors Optionally adds free space to index blocks for subsequent growth Rebuilds BAM blocks, thereby eliminating any prior errors 19
20 DATABASE SHARING Use Global Resource Serialization (GRS) ENQs rather than DASD hardware RESERVEs Avoids contention & monopolization PARMLIB(GRSRNLxx) conversion entry - SYSZRACF 20
21 ENQUEUE RESIDENCY - ERV Enqueue contention issue - low priority TSO user or batch job gets swapped out while still holding an enqueue on SYSZRACF thereby holding up other address spaces waiting on RACF Solution - grant more CPU Service Units to address spaces enqueued on system resources enabling them to complete work before being swapped out PARMLIB(IEAOPTxx) - ERV parameter Range: Default: 500 Recommended:
22 LOGGING Log judiciously SETROPTS LOGOPTIONS(ALWAYS(class) SUCCESSES(class)) SETROPTS OPERAUDIT SETROPTS AUDIT(class) Resource AUDIT(ALL SUCCESSES(level)) Resource GLOBALAUDIT(ALL SUCCESSES(level)) User UAUDIT Reduce logging if related records are not need SETROPTS LOGOPTIONS(NEVER(class)) FACILITY BPX.SAFFASTPATH - if defined, z/os Unix will skip RACF calls and related logging if it can determine on its own that access is allowed by permission bits Note - neither option suppresses logging for users with UAUDIT 22
23 STATISTICS Eliminate the use of Statistics SETROPTS STATISTICS(class) NOSTATISTICS(class) Option Access counts kept only on Discrete profiles Not incremented for GAT or RACLISTed class access May not be accurate in a shared database environment Increases CPU processing to calculate and I/O to retain Updating Statistics in the backup database - ICHRDSNT flag XL1 0x XL1 8x XL1 Cx No updates are duplicated in the backup database (default) Updates other than statistics are duplicated (recommended) Updates including statistics are duplicated (avoid) Limit user logon statistics update to only once per day (z1.11) Implemented via APPL class profiles for associated applications Specify APPLDATA('RACF-INITSTATS(DAILY)') to activate 23
24 RACF COMMANDS Avoid use of commands and utilities that are I/O or processing intensive during peak system activity periods LD ID(), PREFIX(), or DSNS SR NOMASK, AGE, USER, or WARNING LU * LG * RL class * ICHDSM00 IRRDBU00 BLKUPD IRRUT100 IRRUT200 IRRUT400 SETROPTS GENERIC(class) REFRESH [especially DATASET] SETROPTS RACLIST(class) REFRESH [classes with many profiles] Large batches of commands - especially CONNECTs & REMOVEs Specify parameter NOYOURACC (or NOY) on RLIST commands to avoid retrieval and RACLIST processing of all grouping class profiles simply to determine your access 24
RACF & Payment Card Industry (PCI) Data Security Standards RUGONE May 2012
RACF & Payment Card Industry (PCI) Data Security Standards Robert S. Hansel Lead RACF Consultant [email protected] 617 969 9050 Robert S. Hansel Robert S. Hansel is Lead RACF Specialist and founder
21 Things You Didn t Used to Know About RACF
21 Things You Didn t Used to Know About RACF (A Technical Update for IT Auditors) Stuart Henderson The Henderson Group (301) 229-7187 1 Here Are 21 Things Auditors Should Know About RACF One Person s Opinion,
Second Edition (May 1984)
5C28-1342-1 File No. 5370-40 Program Product Resource Access Control Facility (RACF) Auditor's Guide Program Number 5740-XXH Version 1, Release 6 ---- - ----- - - - --- -- ------ -. - Second Edition (May
CICS Transactions Measurement with no Pain
CICS Transactions Measurement with no Pain Prepared by Luiz Eduardo Gazola 4bears - Optimize Software, Brazil December 6 10, 2010 Orlando, Florida USA This paper presents a new approach for measuring CICS
Agenda. z/os Ethical Hacking Vulnerability Scanning & Pen Testing. Mark Wilson RSM Partners. Session Number: 12275. l Disclaimer.
z/os Ethical Hacking Vulnerability Scanning & Pen Testing Mark Wilson RSM Partners Session Number: 12275 Agenda l Disclaimer l Introduction l Objectives l Mainframe Hacking Fact or Fiction? l Penetration
Role-based Access Control in a RACF environment
Role-based Access Control in a RACF environment An investigation of some possibilities for enhancements Lennie Dymoke-Bradshaw June 2011 With contributions from Alan Harrison and GSE UK Security Working
Utility Mainframe System Administration Training Curriculum
Utility Mainframe System Administration Training Curriculum MVS SYSTEM ADMINISTRATION MVS SYSTEM ADMINISTRATION- LEVEL 1 TO 1.5 Name of the Module Common for All Administration LSO TSO/ISPF JCL & UTILITIES
How to Secure Mainframe FTP
How to Secure Mainframe FTP Stu Henderson (301) 229-7187 [email protected] Scott Myers (408) 973-8374 [email protected] 1 AGENDA I. Introduction II. III. IV. How Mainframe FTP is Different Mainframe
Mark Wilson [email protected] Session Details: The Introduction
Everything you wanted to know about mainframe security, pen testing and vulnerability scanning.. But were too afraid to ask! Mark Wilson [email protected] Session Details: The Introduction Agenda Introduction
CA TPX Session Management r5.3
PRODUCT SHEET CA TPX Session Management CA TPX Session Management r5.3 CA TPX Session Management (CA TPX) helps you manage user menus for accessing VTAM applications on the mainframe while offering end
Overview. Business value
PRODUCT SHEET CA VM:Backup for z/vm CA VM:Backup for z/vm CA VM:Backup for z/vm (CA VM:Backup) provides an efficient and reliable means of backing up CMS and non-cms data in z/vm and mainframe Linux systems.
Configuring and Tuning SSH/SFTP on z/os
Configuring and Tuning SSH/SFTP on z/os Kirk Wolf / Steve Goetze Dovetailed Technologies [email protected] dovetail.com Monday, March 10, 2014, 1:30PM Session: 14787 www.share.org Session Info/Eval link
z/os UNIX Systems Services Security Best Practices
z/os UNIX Systems Services Security Best Practices Vivian W Morabito March 12, 2014 8:00AM 9:00AM Session Number 15119 [email protected] Important to have a well designed security environment for UNIX
Session 2826 February 2001. Stop those Unnecessary IPLS: The Dynamic OS/390 Functions
Stop those Unnecessary IPLS: The Dynamic OS/390 Functions [email protected] March 6, 2002 Session 2859 1 Trademarks and Copyrights Trademarks and Registered trademarks used in this presentation
New Security Options in DB2 for z/os Release 9 and 10
New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and
CA Top Secret r15 for z/os
PRODUCT SHEET: CA TOP SECRET FOR z/os we can CA Top Secret r15 for z/os CA Top Secret for z/os (CA Top Secret ) provides innovative, comprehensive security for your business transaction environments, including
Security zsecure Admin and Audit for RACF Version 1.13.1. Getting Started GI13-2309-00
Security zsecure Admin and Audit for RACF Version 1.13.1 Getting Started GI13-2309-00 Security zsecure Admin and Audit for RACF Version 1.13.1 Getting Started GI13-2309-00 Note Note Before using this
Java on z/os. Agenda. Java runtime environments on z/os. Java SDK 5 and 6. Java System Resource Integration. Java Backend Integration
Martina Schmidt [email protected] Agenda Java runtime environments on z/os Java SDK 5 and 6 Java System Resource Integration Java Backend Integration Java development for z/os 4 1 Java runtime
File Management. Chapter 12
Chapter 12 File Management File is the basic element of most of the applications, since the input to an application, as well as its output, is usually a file. They also typically outlive the execution
z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com
1 z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key Resources, Inc. incorporated in 1988
SAP Performance Review/System Health Check
Albert Rodi Consulting IT Specialist IBM e-business Technical Sales IBM Corporation 1507 LBJ Freeway Dallas, TX 75381-9054 (972) 280-4791 [email protected] Copyright 2005 IBM Solutions Technical Sales
Beyond the Software Life Cycle
Beyond the Software Life Cycle CA-Endevor Facilitates Ad-hoc Job Processing Southern CA Endevor User Group June 2008 Rose A. Sakach Endevor Practice Leader - RSH Consulting, Inc. [email protected]
Computer Associates BrightStor CA-Vtape Virtual Tape System Software
Edward E. Cowger, Herb Gepner Product Report 8 October 2002 Historical Computer Associates BrightStor CA-Vtape Virtual Tape System Software Summary Computer Associates (CA s) BrightStor CA-Vtape Virtual
PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT
1 PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-in.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key
z/os 2.1 Security Updates
z/os 2.1 Security Updates September 2013 Julie Bergh [email protected] 1 2012 IBM Corporation Agenda Overview of Security Changes z/os Communication Server RACF ICSF PKI Services z/os ITDS zsecure 2 2
Understanding Disk Storage in Tivoli Storage Manager
Understanding Disk Storage in Tivoli Storage Manager Dave Cannon Tivoli Storage Manager Architect Oxford University TSM Symposium September 2005 Disclaimer Unless otherwise noted, functions and behavior
Program Directory for Backup and Restore Manager for z/vm. version 1 release 2.0. Program Number 5697-J06
IBM Program Directory for Backup and Restore Manager for z/vm version 1 release 2.0 Program Number 5697-J06 for Use with z/vm version 5 release 4 z/vm version 6 release 2 z/vm version 6 release 3 Document
1 of 8 - Forget Free Willy, how about free RACF!
WWW.RACF.NET.AU presents: Forget Free Willy, how about free RACF! a white-paper created by For more information, contact us at [email protected] or call 0412 488 484 Copyright 2007 A review of the various
In-memory Tables Technology overview and solutions
In-memory Tables Technology overview and solutions My mainframe is my business. My business relies on MIPS. Verna Bartlett Head of Marketing Gary Weinhold Systems Analyst Agenda Introduction to in-memory
CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible
PRODUCT SHEET CA Deliver agility made possible CA Deliver r11.7 CA Deliver is an online report management system that provides you with tools to manage and reduce the cost of report distribution. Able
Tivoli Storage Manager Explained
IBM Software Group Dave Cannon IBM Tivoli Storage Management Development Oxford University TSM Symposium 2003 Presentation Objectives Explain TSM behavior for selected operations Describe design goals
CA OPS /MVS Event Management and Automation
CA OPS /MVS Event Management and Automation Security Guide Release 12.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
CA High Performance Recovery for IMS for z/os
PRODUCT SHEET CA High Performance Recovery for IMS for z/os CA High Performance Recovery for IMS for z/os CA High Performance Recovery for IMS for z/os (CA HPR) is designed to allow database administrators
File Manager base component
Providing flexible, easy-to-use application development tools designed to enhance file processing IBM File Manager for z/os, V13.1 Figure 1: File Manager environment Highlights Supports development and
File Management. Chapter 12
File Management Chapter 12 File Management File management system is considered part of the operating system Input to applications is by means of a file Output is saved in a file for long-term storage
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
CA OPS /MVS Event Management and Automation
CA OPS /MVS Event Management and Automation Security Guide Release 12.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Operating Systems CSE 410, Spring 2004. File Management. Stephen Wagner Michigan State University
Operating Systems CSE 410, Spring 2004 File Management Stephen Wagner Michigan State University File Management File management system has traditionally been considered part of the operating system. Applications
DBAs having to manage DB2 on multiple platforms will find this information essential.
DB2 running on Linux, Unix, and Windows (LUW) continues to grow at a rapid pace. This rapid growth has resulted in a shortage of experienced non-mainframe DB2 DBAs. IT departments today have to deal with
z/os Unix System Services Dumps - Dump Debugging for Dummies
Maintenance and Technical Support Technical Support Competence Center z/os Unix System Services Dumps - Dump Debugging for Dummies Matthias Korn z/os Virtual Frontend / Unix System Services EMEA Level
CA MICS Resource Management r12.7
PRODUCT SHEET agility made possible CA MICS Resource Management r12.7 CA MICS Resource Management (CA MICS) is a comprehensive IT resource utilization management system designed to fulfill the information
Raima Database Manager Version 14.0 In-memory Database Engine
+ Raima Database Manager Version 14.0 In-memory Database Engine By Jeffrey R. Parsons, Senior Engineer January 2016 Abstract Raima Database Manager (RDM) v14.0 contains an all new data storage engine optimized
The Advantages Of External Security For DB2 And The Migration Towards RACF. Kurt Struyf, infocura
The Advantages Of External Security For DB2 And The Migration Towards RACF Kurt Struyf, infocura 0 Agenda The need for better data security What does DB2 offer? Why externalizing security? Why RACF? How
Chapter 2 Array Configuration [SATA Setup Utility] This chapter explains array configurations using this array controller.
Embedded MegaRAID SATA User's Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter introduces
The z/os GRS Serialization "Jack of All Trades" Tools for (Performance/Contention/Monitoring...)
Advanced Technical Support The z/os GRS Serialization "Jack of All Trades" Tools for (Performance/Contention/Monitoring...) Session # 1 Nat Stevenson III [email protected] IBM Corporation Advanced Technical
How To Improve Your Database Performance
SOLUTION BRIEF Database Management Utilities Suite for DB2 for z/os How Can I Establish a Solid Foundation for Successful DB2 Database Management? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os
CA View r11.7. Business value. Product overview. Delivery approach
DATA SHEET CA View r11.7 CA View is an automated archival and retrieval system that provides immediate and flexible online viewing of mainframe and distributed output. Its repository is capable of housing
Chapter 12 File Management
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Overview File organisation and Access
Chapter 12 File Management. Roadmap
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Overview Roadmap File organisation and Access
Virtual Networking with z/vm 5.1.0 Guest LAN and Virtual Switch
Virtual Networking with z/vm 5.1.0 Guest LAN and Virtual Switch HILLGANG March 2005 Dennis Musselwhite, IBM z/vm Development, Endicott, NY Note References to IBM products, programs, or services do not
Session: Archiving DB2 comes to the rescue (twice) Steve Thomas CA Technologies. Tuesday Nov 18th 10:00 Platform: z/os
Session: Archiving DB2 comes to the rescue (twice) Steve Thomas CA Technologies Tuesday Nov 18th 10:00 Platform: z/os 1 Agenda Why Archive data? How have DB2 customers archived data up to now Transparent
PCI DSS, z/os and Keeping You from Becoming a News Headline
PCI DSS, z/os and Keeping You from Becoming a News Headline Charles Mills CorreLog, Inc. March 13, 2012 Session #11089 Copyright and Trademarks Copyright 2012 CorreLog, Inc. Trademarks CorreLog is a registered
FDR/UPSTREAM INNOVATION Data Processing Providing a Long Line of Solutions
Presented to FDR/UPSTREAM Innovation Data Processing [email protected] Copyright 2015 2015 All rights INNOVATION reserved. Data Processing. All rights reserved. 1 Presented to INNOVATION Data Processing
SupportPac CB12. General Insurance Application (GENAPP) for IBM CICS Transaction Server
SupportPac CB12 General Insurance Application (GENAPP) for IBM CICS Transaction Server SupportPac CB12 General Insurance Application (GENAPP) for IBM CICS Transaction Server ii General Insurance Application
System z Batch Network Analyzer Tool (zbna) - Because Batch is Back!
System z Batch Network Analyzer Tool (zbna) - Because Batch is Back! John Burg IBM March 5, 2015 Session Number 16805 Insert Custom Session QR if Desired. Trademarks The following are trademarks of the
CA JCLCheck Workload Automation
PRODUCT SHEET CA JCLCheck Workload Automation CA JCLCheck Workload Automation CA JCLCheck Workload Automation (CA JCLCheck WA) validates z/os JCL before it is submitted for execution. CA JCLCheck WA helps
Virtual Networking with z/vm Guest LANs and the z/vm Virtual Switch
Virtual Networking with z/vm Guest LANs and the z/vm Virtual Switch Alan Altmark, IBM z/vm Development, Endicott, NY Note References to IBM products, programs, or services do not imply that IBM intends
systems Managed Storage - Getting there is half the fun Henry steinhauer,hewitt Associates
systems Managed Storage - Getting there is half the fun Henry steinhauer,hewitt Associates IHTRODUCTIOH It is not the scope of this paper to give a detail view of Systems Managed Storage (SMS)*. There
VirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5
Performance Study VirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5 VMware VirtualCenter uses a database to store metadata on the state of a VMware Infrastructure environment.
Data Masking Secure Sensitive Data Improve Application Quality. Becky Albin Chief IT Architect [email protected]
Data Masking Secure Sensitive Data Improve Application Quality Becky Albin Chief IT Architect [email protected] Data Masking for Adabas The information provided in this PPT is entirely subject
IBM DevOps for Enterprise Systems DevOps for z Systems Is Essential To Deliver Real Business Outcomes
DevOps for z Systems Is Essential To Deliver Real Business Outcomes New IBM DevOps capabilities help enterprises deliver significant improvements to transform your software delivery capability 1 Secure
Buffering, Record Level Sharing, and Performance Basics for VSAM Data Sets
Buffering, Record Level Sharing, and Performance Basics for VSAM Data Sets Session 12999 Presented by Michael E. Friske Expectations From This Session You will be given some general rules of thumb for
Improve SQL Performance with BMC Software
Improve SQL Performance with BMC Software By Rick Weaver TECHNICAL WHITE PAPER Table of Contents Introduction................................................... 1 BMC SQL Performance for DB2.......................................
IBML. IMS V6 Security Guide. Scott Chen, Alonia Coleman, Mike Gonzales, Chris Taylor, Mehran Mozaffari. International Technical Support Organization
IBML IMS V6 Security Guide Scott Chen, Alonia Coleman, Mike Gonzales, Chris Taylor, Mehran Mozaffari International Technical Support Organization http://www.redbooks.ibm.com SG24-5363-00 IBML International
This presentation introduces you to the new call home feature in IBM PureApplication System V2.0.
This presentation introduces you to the new call home feature in IBM PureApplication System V2.0. Page 1 of 19 This slide shows the agenda, which covers the process flow, user interface, commandline interface
SQL Replication Guide and Reference
IBM InfoSphere Data Replication Version 10.1.3 SQL Replication Guide and Reference SC19-3638-00 IBM InfoSphere Data Replication Version 10.1.3 SQL Replication Guide and Reference SC19-3638-00 Note Before
Mainframe alternative Solution Brief. MFA Sizing Study for a z/os mainframe workload running on a Microsoft and HP Mainframe Alternative (MFA)
Mainframe alternative Solution Brief MFA Sizing Study for a z/os mainframe workload running on a Microsoft and HP Mainframe Alternative (MFA) Mainframe alternative Solution Brief MFA Sizing Study for a
Scheduling in SAS 9.3
Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3
SMF Digital Signatures in z/os 2.2. Anthony Sofia ([email protected]) Software Engineer at IBM August 14 th 2015
SMF Digital Signatures in z/os 2.2 Anthony Sofia ([email protected]) Software Engineer at IBM August 14 th 2015 Agenda What is a digital signature? How digital signatures enhance SMF data Configuration
JD Edwards World. Database Audit Manager Release A9.3 E21957-02
JD Edwards World Database Audit Manager Release A9.3 E21957-02 April 2013 JD Edwards World Database Audit Manager, Release A9.3 E21957-02 Copyright 2013, Oracle and/or its affiliates. All rights reserved.
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
SAS 9.4 Intelligence Platform
SAS 9.4 Intelligence Platform Application Server Administration Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2013. SAS 9.4 Intelligence Platform:
UPSTREAM for Linux on System z
PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging
CA Mainframe Security Management solutions helps you reduce costs, facilitate new business opportunities, address regulatory compliance requirements,
SOLUTION BRIEF CA Mainframe Security Management Solutions September 2010 how can mainframe security management solutions from CA Technologies help me simplify and unify security? we can CA Mainframe Security
AccXES Account Management Tool Administrator s Guide Version 10.0
AccXES Account Management Tool Administrator s Guide Version 10.0 701P41531 May 2004 Trademark Acknowledgments XEROX, AccXES, The Document Company, and the identifying product names and numbers herein
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Systems Management Advanced job scheduler
System i Systems Management Advanced job scheduler Version 5 Release 4 System i Systems Management Advanced job scheduler Version 5 Release 4 Note Before using this information and the product it supports,
Using the z/os SMB Server. to access z/os data from Windows. -- Hands-On Lab Session 10634-10879
Using the z/os SMB Server to access z/os data from Windows -- Hands-On Lab Session 10634-10879 Using the z/os SMB server to access z/os data from Windows Hands-On-Lab Marna Walle Jim Showalter Karl Lavo
User Experience: BCPii, FlashCopy and Business Continuity
User Experience: BCPii, FlashCopy and Business Continuity Mike Shorkend Isracard Group 4:30 PM on Monday, March 10, 2014 Session Number 14953 http://www.linkedin.com/pub/mike-shorkend/0/660/3a7 [email protected]
z/os Curriculum Job Control Language (JCL) Curriculum JES Curriculum WebSphere Curriculum TSO/ISPF for z/os Curriculum
A relação de cursos de mainfame a seguir representa mais de 1.000 horas de treinamento e-learning, fornecendo uma abordagem ampla e atual sobre o assunto. z/os Curriculum z/os 1.13 Series o z/os Concepts
LES LOGICIELS MAINFRAME
LES LOGICIELS MAINFRAME PrintSubSystem AFP printing on network printers and AFP2PDF conversion Enterprise Print Manager The OS/390 software printing solution AFP Conversion Module PDF makes mainframe data
How-to Access RACF From Distributed Platforms
How-to Access RACF From Distributed Platforms Saheem Granados IBM Wednesday, February 6, 2013 12538 [email protected] Trademarks The following are trademarks of the International Business Machines Corporation
This chapter explains how to update device drivers and apply hotfix.
MegaRAID SAS User's Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter explains an overview
CA Chorus Software Manager
CA Chorus Software Manager User Guide Release 5.1 Third Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
000-574. IBM Tivoli WebSphere App Studio V3.2. Version: Demo. Page <<1/9>>
000-574 IBM Tivoli WebSphere App Studio V3.2 Version: Demo Page 1.Which change is made by the WebSphere Studio Application Monitoring V3.2 distributed Data Collector installer (both GUI and silent)?
Version 14.0. Overview. Business value
PRODUCT SHEET CA Datacom Server CA Datacom Server Version 14.0 CA Datacom Server provides web applications and other distributed applications with open access to CA Datacom /DB Version 14.0 data by providing
Top Ten Security Vulnerabilities in z/os Security
Top Ten Security Vulnerabilities in z/os Security John Hilman Vanguard Professional Services 1 The Issues Is your mainframe critical to your enterprise? Is it central to your Disaster Recover Plan Does
z/os V1R11 Communications Server System management and monitoring Network management interface enhancements
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications
Enterprise Security CPA for IBM MF
Enterprise Security CPA for IBM MF CPA What is it? The CPA (Cross Platform Audit) is a comprehensive log management and critical data monitoring platform for the IBM mainframe. It allows you to collect
HA / DR Jargon Buster High Availability / Disaster Recovery
HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster
IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE
White Paper IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE Abstract The OneFS user mapping service combines a user s identities from different directory services into a single access
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools.
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools. Page 1 of 13 The module developer assumes that you understand basic IBM Tivoli Monitoring
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive One of a series of InfoSphere Guardium Technical Talks Ernie Mancill Executive IT Specialist Logistics This tech talk is being recorded. If you
Hardware Information Managing your server, adapters, and devices ESCALA POWER5 REFERENCE 86 A1 00EW 00
86 A1 00EW 00 86 A1 00EW 00 Table of Contents Managing your server, adapters, and devices...1 Managing your server using the Hardware Management Console...1 What's new...1 Printable PDFs...2 HMC concepts
