+

Search Tips   |   Advanced Search

(ZOS) z/OS System Authorization Facility authorization

Configure the System Authorization Facility (SAF) and the SAF Authorization properties.

To enable SAF authorization:

  1. Click Security > Global security > External authorization providers.

  2. Select the System Authorization Facility (SAF) from the drop-down list under Authorization provider.

  3. Click the Configure button.

When we select SAF authorization, WebSphere Application Server uses the authorization policy stored in the z/OS security product for authorization. If a Lightweight Access Directory Protocol (LDAP) registry or Custom registry is configured and SAF authorization is specified, a mapping to a z/OS principal is required at each login for any protected methods to run:

The common properties for unauthenticated user, SAF authorization, and SAF EJBROLE message suppression are no longer custom properties.

When selected, WAS uses the authorization policy stored in the z/OS security product for authorization.


Unauthenticated user ID

The MVS™ user ID used to represent unprotected servlet requests when SAF authorization is specified or a local operating system registry is configured. This user ID must be a maximum of 8 characters long.

This property definition is used in the following instances:

See following articles in the information center:


SAF profile mapper

Name of SAF EJBRole profile to which a Java EE role name is mapped. The name specified implements the com.ibm.websphere.security.SAFRoleMapper interface.

The com.ibm.ws.security.zOS.authz.SAFRoleMapperImpl implementation class, which is the default SAF role mapper implementation, is initially configured. This initial configuration maps all the characters that are not allowed in a SAF role name, such as the percent (%), ampersand (&), asterisk (*) and blank characters, to a pound (#) character.

See Developing a custom SAF EJB role mapper


Enable SAF delegation

That the SAF EJBROLE definitions are assigned the MVS user identity that becomes the active identity when we select the RunAs specified role.

Select the Enable SAF delegation option only if we select the Enable SAF Authorization option as the external authorization provider.


Use the APPL profile to restrict access to the application server

Use the APPL profile to restrict access to WAS.

If we have defined an SAF profile prefix, the APPL profile used is the profile prefix. Otherwise, the APPL profile name is CBS390. All of the z/OS identities using WebSphere services should have READ permission to the APPL profile. This includes all WAS identities, WAS unauthenticated identities, WAS administrative identities, user IDs based on role-to-user mappings, and all user identities for system users. If the APPL class is not active on the z/OS system, then this property has no effect, regardless of its value.

Information Value
Default: Enabled.


Suppress authorization failed messages from the z/OS security product

Specifies whether ICH408I messages are on or off. The default value for this settings is false (unchecked), which does not suppress messages.

System Management Facility (SMF) records access violations no matter what value is specified for this new property. This property affects the generation of access violation messages for both application-defined roles and for application server run-time-defined roles for the naming and administrative subsystems. EJBROLE profile checks are done for both declarative and programmatic checks:

For more information on SAF authorization, see "Controlling access to console users when using a Local OS registry" in the information center. For more information on administrative roles, see "Administrative roles" in the information center.

Information Value
Default: Disabled, which does not suppress messages.


SMF audit record strategy

Determines when an audit record is written to the System Management Facility (SMF). On each authorization call, RACF or an equivalent SAF-based product, can write an audit record to SMF with the result of the authorization check.

WAS for z/OS uses the SAF RACROUTE AUTH and RACROUTE FASTAUTH operations and passes the LOG option specified in the security configuration. The options are DEFAULT, ASIS, NOFAIL, and NONE.

The following options are available from the drop-down list:

DEFAULT

When multiple role constraints are specified, such as a user must be in one of a set of roles, all of the roles except for the last role is checked with the NOFAIL option. If the authorization is granted in one of the roles before the last role, WAS writes an authorization success record. If the authorization is not successful in these roles, the last role is checked with the ASIS log option. If the user is authorized to the last role, a success record might be written. If the user is not authorized, a failure record might be written.

ASIS

That the audit events are recorded in the manner that is specified in the profile that protects the resource or in the manner specified by the SETROPTS options.

NOFAIL

That failures are not recorded. Authorization failure messages are not issued, but successful authorization audit records might be written.

NONE

That neither successes or failures are recorded.

Only one authorization failed record is written for a failed Java EE authorization check even if several SAF authorization calls are made. For more information on the LOG options for SAF RACROUTE calls, see the RACF or equivalent SAF-based product documentation. We can also see the topic Audit Support for additional information about the SMF auditability of WAS calls to RACROUTE macros and SAF APIs during resource authorization processing.


SAF profile prefix

Prefix which will be added to all the SAF EJBROLE profiles used for the Java EE roles. This prefix is also used as the APPL profile name and is inserted into the profile name used for CBIND checks. There is no default value for the SAF profile prefix field. If a prefix is not explicitly specified, then no prefix is added to the SAF EJBROLE profiles, the default value of CBS390 will be used as the APPL profile name, and nothing is inserted into the profile name for CBIND checks.

Use APPL profile to restrict access to WAS

If we have defined an SAF profile prefix, the APPL profile used is the profile prefix. Otherwise, the APPL profile name is CBS390. All of the z/OS identities using WebSphere services should have READ permission to the APPL profile. This includes all WAS identities, WAS unauthenticated identities, WAS administrative identities, user IDs based on role-to-user mappings, and all user identities for system users. Note that if the APPL class is not active on the z/OS system, then this property has no effect, regardless of its value.

The SAF profile prefix corresponds to the property, com.ibm.security.SAF.profilePrefix.name, in the security.xml file.


Related:

  • System Authorization Facility user registries
  • Authorizing access to resources
  • Developing a custom SAF EJB role mapper
  • Audit support