Resource Classes for ESMAC and Operator Command Security

The list below defines the name of each default resource class used in Enterprise Server for ESMAC and operator command security, its meaning, the type of resource entities it contains, and the minimum permission that a user requires on the entities.
OPERCMDS
Relation
Class for operator commands used by casstart/casstop/casfile/cassub/casout... commands
Entities
Entity Description
JESALIAS If the user has 'Update' access to this resource, they are able to update or delete entries from the Alias table. If the user only has 'Read' access to this resource, the Update and Delete options are not available. If the user has 'None' access to this resource, they cannot access the Alias table at all.
Access Level
None, Read, or Update
MFESMAC
Relation
MAC Class for controlling access to ESMAC Resources

An attempt has been made to match the Entities listed below with the individual flags that are available for each user as defined in the old CICS Resource definition.  For each "flag" there are three states:  None, Read, Update.

Entities
Entity Description
TABLE This is the equivalent of the "Master" flag within the CICS RDT file.    If your user has "Update" access to this resource then they will have the ability to interact with the majority of ESMAC function. Primary items controlled by this setting are the appearance of the buttons for controlling the SEPS (Tracing, Stopping), Stopping the Server, Accessing the console.log, trace data, dump data, and the list of currently active ACEEs. If a user has "None" then they will not be shown any buttons other than the Server Status Button and the Monitoring button in addition to the Chg User button which allows them to sign-on.  The basic effect of no access to this resource is that they are treated in the same way as an unauthenticated user.  If they have "Read" access they will be shown the options but will be unable to perform any updates.   If they have "Update" access or greater than they have full control of these functions.
GRP This resource controls access to the buttons under the Resources dropdown when the By Group selection is used.  If the user has "Update" access to this resource, they will be able to access all the buttons that appear under the Resources dropdown when the By Group selection is made.

The user also needs "Update" access, as well as the corresponding permission for a particular resource, in order to modify resources (including delete).

IMS This controls access to the buttons under the Resources drop down when the IMS selection is utilized.  See notes on GRP for details on the access rights.
JCL This controls access to the buttons under the Resources drop down when the JES selection is utilized.  See notes on GRP for details on the access rights.
BAT, DCT, DOC, FCT, ICE,  JCT, MPR, PCT, PLT, PPT, SIT, SNT, SUP, SYS6, SYSC, TCP, TCT, TERM, TST, TTYPE, URI, XAT, XLT This controls the access a user has to the various resources (e.g. DCT, PCT, FCT) when selected via the By Type or Active menus under the Resources pulldown.   "None" indicates that they can do nothing with this resource type, "Read" indicates that they can see the current settings, and "Update" indicates that they can modify the entries of this type.

For example, if a user has READ access to PCT*, he or she will have the ability to view any PCTs defined to the system, but will not be able to update the entries. If the user has "Update" access then he or she can change and even install new ones. (assuming appropriate CINS authority)

The resources listed above also control access to specific pages. If for instance a page is primarily the DCT details for a DCT entry then attempting to access this page with no authority will result in your being driven to a "Sign-on" screen.

ENV

This controls whether a user has access to view the environment variable settings of an enterprise server by enabling or disabling the Env. Vars. button or using a direct URL.

To use this entity, create a new element (ENV*) in the LDAP schema in the CN=MFESMAC group below CN=Enterprise Server Resources. Configure the group or the user access rights using the microfocus-MFDS-Resource-ACE attribute - set ACE=deny:SYSADM group:read (disables the Env. Vars. button in ESMAC) or ACE=allow:SYSADM group:read (enables Env. Vars. in ESMAC).

TCLS

This controls whether a user has access to view the transaction class settings of an enterprise server by enabling or disabling the TranClass button or using a direct URL.

To use this entity, create a new element (TCLS*) in the LDAP schema in the CN=MFESMAC group below CN=Enterprise Server Resources. Configure the group or the user access rights using the microfocus-MFDS-Resource-ACE attribute - set ACE=deny:SYSADM group:read (disables the TranClass button in ESMAC) or ACE=allow:SYSADM group:read (enables TranClass in ESMAC).

MQL

This controls whether a user has access to view MQ listener and writer settings of an enterprise server in ESMAC.

To use this entity, create a new element (MQL*) in the LDAP schema in the CN=MFESMAC group below CN=Enterprise Server Resources.

Use the microfocus-MFDS-Resource-ACE attribute to configure the group or the user access rights. For example:

  • ACE=deny:SYSADM group:read - denies access to any MQ listeners and writers in ESMAC
  • ACE=allow:SYSADM group:read - enables users to view the MQ listeners and writers in ESMAC
  • ACE=allow:SYSADM group:alter - enables users to alter MQ listeners and writers in ESMAC
Access Level
None, Read, Update