Security Configuration Custom Configuration Information

Each security configuration for MFDS, ES Default Security, or a particular enterprise server instance support additional configuration that can be set by modifying the text in the Configuration Information field. Text in this field is organized into sections which begin with a tag label in square brackets, followed by lines containing name-value pairs.

You can add these settings in the Configuration Information field for the security configuration, and not a Security Manager. Security Managers also have a custom configuration setting, with parameters defined by the External Security Manager module they use. See the documentation for the specific ESM module for more information.

The following are the configuration sections, and the options that can be set in each section:

[Admin] section

allow-list=yes | no
If this is set to yes, then Admin LIST requests, for example, list users, groups, and resource access rules are allowed for all users, with no additional access check.

[Audit] section

category 3 events=yes | no
Setting this option disables audit category 6 events for SAF Auth and XAuth calls, and enables category 3 events for Verify, Auth, and XAuth calls. This option is provided for backwards compatibility.

The default value is no.

password change success = yes | no
Setting this option enables an extra audit event for every successful password change.
Note: Password change rejections and related errors are always audited. See Audit event 6 2 in Audit Event Codes for more information.

The default value is no.

selective=yes | no
This setting enables the optional selective-auditing feature. It has no effect if auditing is not enabled.

When selective auditing is enabled, auditing for normal ESF requests is suppressed unless the AUDIT flag is set in the request, or an ESM Module determines that the particular request should be audited. The flag can be set by the caller. Currently, only the MLDAP ESM Module performs selective auditing. If a user, group, or resource access rule object contains the optional LDAP Boolean attribute microfocus-MFDS-Audit, and the value of the attribute is TRUE, then requests pertaining to that object will be audited. For example, if a user is defined in LDAP with microfocus-MFDS-Audit set to TRUE, and selective auditing is enabled, then any request pertaining to that user - a Verify request signing the user on or an Auth request for resource access on that user's behalf - will be audited.

The default value is no.

[Cache] section

flush on change=yes | no
Set to yes to tell the cache to discard any cached Verify result if it receives another request for the same user with a different result. See Using Flush on Change for more information. This is only useful when Verify caching is enabled.
ignore=list of request fields
When the ESF cache checks to see whether the request it is currently processing matches a cached request, it will ignore the fields listed in this configuration entry when comparing them. That means the cached result will be used even if the current request and the cached request differ in one of more of the listed fields. This is useful if the fields in question do not change security decisions in your environment.

The list can be zero or more field names, separated with whitespace and/or commas.

Currently the fields that can be included are:

subsystem
The Enterprise Server subsystem, such as CICS or IMS.
subsys
An alias for "subsystem".
facility
The facility, which is usually a terminal name or other input source.
transaction
The transaction name, for subsystems where this is relevant.
trans
An alias for "transaction".

Currently no ESM Modules make use of any of these fields when making security determinations, so it is safe to ignore any or all of them.

The default values are subsystem, facility. Transaction is not ignored by default because it is one of the most likely to be encountered in custom ESM Modules.

report interval=seconds
You can configure how often reporting happens by setting the report interval option. Its value is an integer, representing the approximate time between reports in seconds. Setting this to 0 disables reporting.
requests=list of request types
This setting specifies what type of ESF requests can be cached. It is set to a list of tokens, separated by commas or spaces. See Requests for a full list of possible tokens.
tracing=integer
Controls trace messages from the ESF cache. If this is set to 0, tracing is disabled. Positive values enable progressively verbose trace information; currently values 1-5 are supported.

The default value is 0.

See the chapter ESF Caching for more information.

[Operation] section

failover retry interval=seconds | never
This option changes the behavior of redundant mode. It is ignored if redundant mode is not enabled. See the redundant setting below for more information. By default, when redundant mode is enabled, failing Security Managers are retried on every request when they would normally be invoked. This might cause performance issues if a failed manager takes a long time to respond.

If this option is set to a positive number, a failed Security Manager only retries when at least that many seconds have elapsed since it failed.

If this option is set to 0 or never, a failed Security Manager is disabled until ESF is reinitialized or the process is restarted.

federate=yes | no | compatible
Control the federation of group information among Security Managers. See Security Federation for more information. This only has an effect if more than one Security Manager is configured.

The default value is compatible for product versions through to 8.0, and yes for 9.0 and later. Micro Focus recommends setting it to yes if multiple Security Managers are used.

password case=upper | lower | preserve [1]
Fold passwords to upper or lower case when processing Verify requests, or leave them as supplied. The default value is preserve.
protect sensitive data=yes | no
If enabled, sensitive data such as passwords are obfuscated in memory to help prevent its disclosure.

The default value is yes. This should only be disabled if an issue is suspected with sensitive data protection.

redundant=yes | no
If this option is set to yes, you can configure multiple equivalent Security Managers and let processing continue as long as at least one Security Manager is available. By default, if any Security Manager returns an error during initialization or security request processing, the request fails. If redundant mode is enabled, initialization and request processing only need one successful Security Manager.

The default value is no.

trim whitespace=yes | no
If enabled, leading and trailing whitespace in any of the character-string fields of an ESF request will be removed. This is useful if requests are likely to contain extraneous whitespace.

The default value is yes. This should only be disabled if an issue is suspected with whitespace trimming.

update interval=seconds
If this is set to a positive number, ESF waits at least that many seconds between checks for administrative update notifications. Update notifications are used to tell ESF that security information has changed and it should discard cached data and update information it has stored about users and groups. This check might affect performance under heavy loads, in which case setting an update interval can improve performance, at the cost of ESF taking more time to recognize that security information has been changed.
user exit=module-name
Configure a user exit module. See ESF User Exit for more information.
userid case=upper | lower | preserve [1]
Fold (force) userids, also known as usernames, to upper or lower case when processing Verify requests, or leave them as supplied. The default value is preserve (do not alter userids).
username case=upper | lower | preserve [1]
A synonym for userid case. If both are set, the userid case setting takes precedence.
verify throttle threshold=integer | none
Set this to specify at what point verify throttling is activated, or to disable verify throttling. If the value is a positive integer, it represents the maximum number of Verify requests that will be accepted within one second before the process starts throttling (imposing a delay) on them. This makes it more difficult to guess valid credentials by brute force.
Note: In an enterprise server instance Verify requests are typically processed by SEPs, so the effective threshold is actually this value times the number of regular SEPs available.

If the value is negative or zero, or the word none, then throttling is disabled.

The default value is 100.

[Passtoken] section

allow=none | generate | signon | both | yes
Specifying none disables pastokens, generate enables passtoken generation but not their use, signon enables passtoken use for signon but not generation, both enables both generation and signon, and yes which is a synonym for both.

See Passtoken Options for ESF Manager for more information.

[Trace] section

name mapping=yes | no
If enabled, trace messages are logged during name-mapping operations.

The default value is no.

[Verify] section

map short names=yes | no
If enabled, when a request to Verify (authenticate) a user is submitted with a username that is no more than 8 characters long, ESF will first attempt to map this to a "long name" (ESM username). If that is successful, the long name will be used in place of the name provided in the request. This option is useful when name mapping is enabled, because some Enterprise Server facilities do not permit entering long names, and have to use Enterprise Server mainframe-style 8-character userids ("short names") instead. These include the CICS CESN and CESL transactions and the USER parameter on the JCL job card.

The default value is no. Micro Focus recommends you enable this feature if you use name mapping.