Securing Adabas & Natural Environments. Becky Albin Chief IT Architect
|
|
- Lawrence Bryan
- 6 years ago
- Views:
Transcription
1 Securing Adabas & Natural Environments Becky Albin Chief IT Architect
2 Find Your Inner Genius at ProcessWorld 2012! Get smarter about using IT to improve business performance Discover inspiring solutions to your pressing business challenges Open your mind to new approaches, new tools and new people Save the Date ProcessWorld 2012 Orlando, Florida October 15-17
3 "Moving Forward with Adabas 8" Duration 3.0 hours Audience: DBA's and Programmers. Speaker: Jim Poole (Verizon) Adabas 8 has been a whirlwind of changes where there is a fear that shops have overlooked the incredible range of new features and possibilities. With Adabas 8.2 alone, there were over 40 changes that provide opportunities for DBA and programmers alike. In this fast-paced technical presentation, many of the Adabas 8 changes are explained and how they impact the ways we do business. Enroute, recent benchmark performance studies were done on Adabas caching, changing some long-held paradigms. Those results are presented. Topics include: -Adabas Caching (what, when, why) -Date/Time System Fields -Spanned Records, prevent future risk -Logical removal of fields and descriptors -Improvements to PLOG and WORK -Event Log -A Panoply of other
4 Proposed Customer And SAG Topics for Process World 2012 Customer Presentations With SAG State of Delaware Modernization of Criminal Justice Info System Jody Colhouer of National Business Center - use of Adabas LOBs and EntireX Pam Schwartz of State of Virginia Dept. of Motor Vehicles - use of EntireX George Wolff of NYC DOITT & Nomura, Jim Chambers - Event Replicator Penn State University Data Masking for Adabas Alaska Department of Natural Resources Ada/Nat/BPM customer story Natural ziip Nomura Securities State of Virginia - ApplinX FSCJ Modernization story with ARIS Mashzone Bob Berg of American Family Insurance Adabas SQL Gateway Eric Wood Becky Albin Eric Wood Becky Albin Becky Albin TBD Patrick Gould Eric Wood Bob Jeffcott Tim Ward
5 Proposed Customer And SAG Topics for Process World 2012 Customer Presentations With SAG Travel BA Sys Natural for AJAX, ARIS Mashzone COBOL Modernization Story with ApplinX and/or EXX Adabas and Natural Roadmaps and Future Strategy Guido will follow up TBD SAG HQ
6 Agenda/Topics Securing Adabas ADASCR Adabas Data Encryption Adabas SAF Security RACF or CA-ACF2 or CA-Top Secret Securing Natural Natural Security Natural SAF Security RACF or CA-ACF2 or CA-Top Secret
7 Why Look At Enhancing Security??? Most intrusions are from Internal Employees/Users not hackers Many have not implemented any data security only application security Natural Security ONLY secures Natural New Rules/Regulations/Requirements HIPPA/SOX/BASIL/etc
8 Adabas Security ADASCR ADASCR provides access/update protection: Database File Field Value Access/update permission values ranging from 0 to 14 Stored in Adabas Security File (not external security product) Password must be passed within the application: ADDITIONS 3 of the Adabas Control Block Within the application Inserted via User Exit 1 of the Adabas nucleus
9 Adabas Security ADASCR //DDCARD DD * ADARUN PROGRAM=ADASCR,MODE=MULTI,DATABASE=199,SVC=236 //DDKARTE DD * ADASCR PROTECT FILE=1,ACC=1,UPD=10 * ADASCR INSERT PW=PRODPASS,FILE=1,ACC=1,UPD=1 ADASCR INSERT PW=USERDBA,FILE=1,ACC=14,UPD=14 ADASCR INSERT PW=TESTPASS,FILE=1,ACC=10,UPD=10 * ADASCR SBYVALUE PW=PRODPASS,FILE=1 ADASCR CRITACC='A=DC.',VALACC='A(NEW YORK)' ADASCR CRITUPD='A=DC.',VALUPD='A(NEW YORK)'
10 Adabas Security Encryption Initially set with ADACMP Adabas file level Must provide the encryption key at the time records are stored Key is also needed to read/decrypt Adabas data Encryption key is passed via ADDITIONS4 of the Adabas Control Block Encryption key is not stored don t loose it!!! Only encrypts DATA, not INDEX structures
11 Adabas Security Encryption Initially set with ADACMP ADACMP COMPRESS ADACMP FNDEF='01,AA,7,A,DE,FI' ADACMP FNDEF='01,AB,15,A,DE,MU,NU' ADACMP FNDEF='01,GA' ADACMP FNDEF='02,AC,15,A,NU' ADACMP FNDEF='02,AD,2,P,FI' ADACMP FNDEF='02,AE,5,P,NU' ADACMP FNDEF='02,AF,6,W' ADACMP FNDEF='01,DT,8,P,DT=E(DATETIME),TZ' ADACMP COLDE='7,Y1=AF' ADACMP SUBDE='BB=AA(1,4)' ADACMP SUPDE='CC=AA(1,4),AD(1,1)' ADACMP HYPDE='1,DD,4,A,MU=AB,AC,AD' ADACMP PHONDE='EE(AA)' ADACMP SUBFN='FF=AA(1,2)' ADACMP SUPFN='GG=AA(1,4),AD(1,1)' ADACMP CODE=abcdefgh Field AA Field AB Group GA Field AC Field AD Field AE Field AF Field DT Collation DE Subdescriptor BB Superdescriptor Hyperdescriptor Phonetic Desc Subfield FF Superfield GG Encryption
12 Adabas SAF Security What is SAF? System Authorization Facility z/os standard, accepted by auditors Enables plug in security when implementing RACF or CA-ACF2 or CA-Top Secret Implements mainframe registry users, permissions, system/user defined entities Why not just use ADASCR No tie back to specific user
13 Adabas SAF Security ADASAF Functionality Secure database nucleus, files and commands (RESOURCES) Adabas Utilities Adabas Operator Commands Cross-level checking (where from, Prod/Dev/Test, etc ) Protection of Transaction Data (optional) Adabas Passwords and Cipher Codes
14 Adabas SAF Security ADASAF Functionality Protection of Adabas Online System Protection of Adabas Stored Procedures Adabas Online Systems Remote User Protection Adabas SQL Gateway Protection Adabas Cluster Services and Parallel Services Clips for Natural, EntireX, Entire Net-Work
15 Adabas SAF Security Adabas resources User permissions for Adabas files Access/Update where from in addition to who John is permitted to access file 3 from test systems Test Operator commands restricted DUQ allowed but not STOPU do not check commands such as RC Production
16 Adabas SAF Security Secure resources Utility execution protected user1 may run ADAREP but not ADAINV Operator commands restricted DUQ allowed but not STOPU Remote user control (WCP) Use WCP LINK name Use WCP NODE name Only in conjunction with WAF Initiate a pop-up window on the PC
17 Adabas SAF Security Cipher and passwords ADASCR Cipher codes & Passwords held in RACF (INSTDATA) inserted at the target database no longer need to carry cipher/password on the wire hard-code cipher/password in the application Test Production
18 Adabas SAF Security Customization Parameter module - SAFCFG set global options ABS Adabas Basic Services DDSAF set options specific to an individual nucleus Not all option can be set Overwrite values defined in the parameter module
19 Adabas SAF Security Parameters - example NA2PPRM GWSTYP=1, SECURITY SYSTEM X NWCLASS=ADAXLV, CROSS-LEVEL CLASS X DBCLASS=ADASEC, DATABASE CLASS X DELIM=Y, ENTITY NAME FORMAT X FAILMODE=W, WARNING MODE X GWMSGL=1, TRACE VIOLATIONS X MAXFILES=32, MAX CACHED FILES PER USER X MAXPCC=10, MAX PASSWORDS/CIPHERS X PASSWORD=N, AUTOMATIC PASSWORDS X CIPHER=N, AUTOMATIC CIPHERS X ETDATA=N, ET DATA PROTECTION X ADASCR=N, ADASCR COMPATIBILITY X XLEVEL=2, CROSS-LEVEL CHECKING X GROUP=N, USE GROUP INSTEAD OF USER X DBNCU=10 MAX CACHED DB CHECKS PER USER END
20 Adabas SAF Security On-line administration Natural application SYSAAF Integrated with SYSAOS Features Reset a user or all users Performance information from internal permissions cache Restart AAF inside Adabas reload code (bring in a fix 24*7)
21 Adabas SAF Security Architecture
22 Adabas SAF Security Architecture User Session Administrator Router SAF Gateway Extension Adabas with SAF Extension Adabas with SAF Extension SAF Configuration File RACF CA-ACF2 CA-Top Secret
23 Data Masking for Adabas
24 Close a Gap Provide what s required Hide what s not necessary Provide high quality test data Test Application Data Masking Masked Copy of Production Enhance Use Adabas Tools to create Rules Run-time parameter Data Mapping Production Application Meta-data Production Protect sensitive production data
25 Natural Security
26 Natural Security and SAF Security Controls and checks the access to a Natural environment Protects Natural environment against unauthorized access and improper use Many objects supported: User, User Types, Groups Applications, Libraries Data access (DDM s / Files) Utilities Secures remote development environments (Natural for Windows/NaturalONE) Natural Security Group User Type Libraries Data Access External Security Systems Operating System User Utilities Applications Natural SAF Security RACF, ACF2 TopSecret
27 Natural SAF Facility
28 NSF426 Overview Natural SAF Security based on Natural Security no SAF hooks in Natural or Natural Utilities all is controlled by Natural Security Nucleus NSC Nucleus calls SAF Server or NSC Server dependent if Natural SAF is installed/switched on Natural SAF Security Using central SAF Server Avoid of APF authorization
29 NSF426 Architecture SAF Server External Security System SAF Administration SYSSEC Application NSC Administration NSF Clip Natural NSC Layer NSC Clip Natural Utilities NSC Database (FSEC)
30 NSF Features NSC Definitions RACF Definitions Library Profile Environment NSC Group User n NSF RACF Group User n Utility Profile User 2 User 1
31 NSF Features NSC Definitions RACF Definitions Library Profile Environment NSC Group User n NSF RACF Group User n Utility Profile User 2 User 1 Resource: Library
32 NSF Features NSC Definitions RACF Definitions Library Profile Environment NSC Group User n NSF RACF Group User n Utility Profile User 2 User 1 Resource Library and Environment
33 Summary NSF Features User authentication User-ID/password check via SAF SAF delivers *GROUP and *USER-NAME NSC determines group profile No user Definitions in NSC Mixed case passwords NSC user maintenance Library Access Logon Check via SAF Only default Library Profile applicably
34 Summary NSF Features Environment Check Environment determined by the system files FNAT, FUSER, FDIC and FSEC Define a profile for each system-file combination Control user access to this profiles ET-ID generation Generates a unique ID for saving Adabas End of Transaction data This may be handled by NSC or NSF There is an alternate algorithm implemented in NSF.
35 Other Security Options EntireX SAF Security (RACF, ACF2, TSS) UNIX local security or LDAP Windows local security of LDAP Entire Net-Work SAF Security (RACF, ACF2, TSS) Adabas SQL Gateway CNXNOPREAUTHORIZE parameter Adabas Online System (AOS) Requires Natural Security
36 Closing slide Thank You!
Software AG TechEd 2015 User Conference
Software AG TechEd 2015 User Conference Initial Customer Experiences with Event Analytics for Adabas Don Ellis State of MN Becky Albin - Software AG Eric Wood - Software AG 1 Event Analytics for Adabas
More informationAdabas v8.3 Sneak Peek with Adabas v8.2 update. Becky Albin Chief IT Architect
Adabas v8.3 Sneak Peek with Adabas v8.2 update Becky Albin Chief IT Architect Becky.Albin@softwareag.com The information provided in this PPT is entirely subject to change!!! Adabas v8.3 scheduled for
More informationADVANCED DATABASES CIS 6930 Dr. Markus Schneider. GROUP - 1 Pragna Pasunuri Jithendra Yella Satya Krishna Priyanka Karanam Sankeerth Reddy Mogili
ADVANCED DATABASES CIS 6930 Dr. Markus Schneider GROUP - 1 Pragna Pasunuri Jithendra Yella Satya Krishna Priyanka Karanam Sankeerth Reddy Mogili ADABAS CONTENTS FEATURES DATA MODEL DATA STRUCTURES APPLICATION
More informationSecurity Interface between ADABAS/NATURAL and RACF/ACF2/TOP SECRET Product Overview
Security Interface between ADABAS/NATURAL and RACF/ACF2/TOP SECRET Product Overview TREEHOUSE SOFTWARE, INC. 2605 Nicholson Road, Suite 230 Sewickley, PA 15143 Phone: 724.759.7070 Fax: 724.759.7067 E-mail:
More informationPreface... V Table of Figures... XIII
Preface When I presented my experiences with the Event Replicator for Adabas at the International Users Group Conference in Prague, 2010, Software AG and conference attendees inspired and encouraged me
More informationAdabas Concepts of a Database for Mission-Critical Applications
Adabas Concepts of a Database for Mission-Critical Applications Friedrich-Schiller-Universität Jena Lehrstuhl für Datenbanken und Informationssysteme Prof. Dr. Klaus Küspert February 1, 2011 Software AG
More informationExperiences with Adabas Migration From to Sacramento, CA. 21 June Dieter W. Storr
Experiences with Adabas Migration From 7.4.4 to 8.1.3 Sacramento, CA 21 June 2010 - Dieter W. Storr June 2010 dstorr@storrconsulting.com 2 June 2010 dstorr@storrconsulting.com 3 Harbor of Monterey, California
More informationSAS/ACCESS 9.3 Interface to ADABAS
SAS/ACCESS 9.3 Interface to ADABAS Reference SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. SAS/ACCESS 9.3 Interface to ADABAS: Reference. Cary,
More informationWhat s new with EntireX Communicator 7.3 Rolf Bahlke crossvision Chief Architect
What s new with EntireX Communicator 7.3 Rolf Bahlke crossvision Chief Architect October 2006 Project Status Next release of EntireX Communicator Version 7.3 Planned release date end of November 2006 z/os
More informationTECHED USER CONFERENCE MAY 3-4, 2016
TECHED USER CONFERENCE MAY 3-4, 2016 Bruce Beaman, Senior Director Adabas and Natural Product Marketing Software AG Software AG s Future Directions for Adabas and Natural WHAT CUSTOMERS ARE TELLING US
More informationEntireX Highlights of new Features
EntireX 7.3 - Highlights of new Features Crossvision Product Management Software AG EntireX 7.3 Highlights March 2007 Seite 1 EntireX Key Enhancements Key Enhancement areas CentraSite EntireX Workbench
More informationCA Top Secret and CA ACF2 101
CA Top Secret and CA ACF2 101 Reg Harbeck CA Wednesday, August 15, 2007 Session 1784 Agenda External Security CA Top Secret (TSS) CA ACF2 (ACF2) How to learn more Q & A 2 Data Security Protection of resources
More informationConsistADS - Migration System for SAG
ConsistADS - Migration System for SAG Advanced Development Solution (ADS) Basic Concepts ConsistADS is a solution including a set of tools designed for migrating applications written in Natural and Adabas
More informationwebmethods Optimize for Infrastructure Guide for Enterprise Transaction Systems
webmethods Optimize for Infrastructure Version 8.0 June 2009 This document applies to webmethods Optimize for Infrastructure Version 8.0 and to all subsequent releases. Specifications contained herein
More informationDieter W. Storr. Efficient Usage of Adabas Replication
Dieter W. Storr Efficient Usage of Adabas Replication Dieter W. Storr Efficient Usage of Adabas Replication A Practical Solution Finder Edited by Stephen Fedtke VIEWEG+ TEUBNER Bibliographie information
More informationEleven Steps to Make Mainframe Security Audits More Effective and Efficient
Eleven Steps to Make Mainframe Security Audits More Effective and Efficient These are some things I ve learned about auditing IBM mainframe computers by trying a lot of approaches, some of which worked
More informationCA Teleview Session Management for z/os r4.4
PRODUCT SHEET CA Teleview Session Management for z/os CA Teleview Session Management for z/os r4.4 CA Teleview Session Management for z/os (CA Teleview) provides organizations with a powerful, scalable
More informationTHINK DIGITAL RETHINK LEGACY
THINK DIGITAL RETHINK LEGACY Adabas & 2050+ Platform Strategy & Roadmap Bruce Beddoe VP Adabas Systems 1 % BUSINESS & MISSION-CRITICAL 2 For internal use only Billions invested in DIFFERENTIATING business
More informationVanguard Advisor TM Your Way: Enhanced Masking, Report Formatting and Exception Criteria. Presented by Vanguard Integrity Professionals
Vanguard Advisor TM Your Way: Enhanced Masking, Report Formatting and Exception Criteria Presented by Vanguard Integrity Professionals Legal Notice Copyright 2013 Vanguard Integrity Professionals, Inc.
More informationSAS/ACCESS 9.2. Interface to ADABAS Reference. SAS Documentation
SAS/ACCESS 9.2 Interface to ADABAS Reference SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2008. SAS/ACCESS 9.2 Interface to ADABAS: Reference.
More informationMANEWS Issue Number 21 the Mainframe Audit News
This newsletter tells you stuff you need to know to audit IBM mainframe computers runinng with z/os and the MVS operating system. This issue we show you how to plan the data gathering for your audit. Table
More informationTutorial: Lessons From A Real Mainframe Break-In Over the Internet
Tutorial: Lessons From A Real Mainframe Break-In Over the Internet Stu Henderson 5702 Newington Road Bethesda, MD 20816 (301) 229-7187 STU@STUHENDERSON.COM What You ll Hear Today Brief comments on why
More informationLets start with the standard disclaimer. Please go to the next slide
DB2 10 for z/os Security Enhancements James Click Pickel to edit Master text styles IBM Silicon Valley Laboratory DB2 for z/os Second Security level Architect Session: A05 Time: 9 November 2010 11:00 am
More informationCIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1
Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is
More informationTRIM. ADABAS/NATURAL Performance Monitor Product Overview
TRIM ADABAS/NATURAL Performance Monitor Product Overview TREEHOUSE SOFTWARE, INC. 2605 Nicholson Road, Suite 230 Sewickley, PA 15143 Phone: 724.759.7070 Fax: 724.759.7067 E-mail: tsi@treehouse.com http://www.treehouse.com
More informationVanguard Integrity Professionals ez/token
RSA SecurID Ready Implementation Guide Partner Information Last Modified: March 18, 2014 Product Information Partner Name Web Site Product Name Version & Platform Product Description Vanguard Integrity
More informationIBM. PDF file of IBM Knowledge Center topics. IBM Operations Analytics for z Systems. Version 2 Release 2
IBM Operations Analytics for z Systems IBM PDF file of IBM Knowledge Center topics Version 2 Release 2 IBM Operations Analytics for z Systems IBM PDF file of IBM Knowledge Center topics Version 2 Release
More informationADABAS File Access Guide
ADABAS File Access Guide Release 813 November 2013 IKAN Solutions NV Schaliënhoevedreef 20A B-2800 Mechelen BELGIUM Copyright 2013, IKAN Solutions NV No part of this document may be reproduced or transmitted
More informationSecuring Mainframe File Transfers and TN3270
Securing Mainframe File Transfers and TN3270 with SSH Tectia Server for IBM z/os White Paper October 2007 SSH Tectia provides a versatile, enterprise-class Secure Shell protocol (SSH2) implementation for
More informationACCESS Procedure Reference
59 CHAPTER 5 ACCESS Procedure Reference Introduction 59 Case Sensitivity in the ACCESS Procedure 60 ACCESS Procedure 60 Description 61 PROC ACCESS Statement Options 62 Options 62 SAS System Passwords for
More informationTop 12 Mainframe Security Exposures and Lessons From A Real Mainframe Break-In
Top 12 Mainframe Security Exposures and Lessons From A Real Mainframe Break-In Stu Henderson 5702 Newington Road Bethesda, MD 20816 (301) 229-7187 STU@STUHENDERSON.COM What You ll Hear One Person s Experiences
More informationOpen Data Analytics for z/os Version 1 Release 1. Solutions Guide IBM SC
Open Data Analytics for z/os Version 1 Release 1 Solutions Guide IBM SC27-9036-00 Note Before using this information and the product it supports, read the information in Notices on page 107. This edition
More informationChallenges and Issues for RACF Systems
Payment Card Industry (PCI) Challenges and Issues for RACF Systems Jim Yurek Vanguard Integrity Professionals February 28, 2011 Session Number 8507 The Problem: Credit Card Breaches As long as we have
More informationCIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1
Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is
More informationVANGUARD Compliance Manager VANGUARD Policy Manager VANGUARD Security Manager VANGUARD Enforcer
VANGUARD Compliance Manager VANGUARD Policy Manager VANGUARD Security Manager VANGUARD Enforcer VANGUARD Compliance Manager Customization Compliance Support Performs specific custom baseline checks Performs
More informationCA Top Secret Security for z/os CA RS 1710 Service List
CA Top Secret Security for z/os 16.0 1 CA RS 1710 List Description Type RO91062 PASSPHRASE VIOLATION IN FAC(STC) CAUSES LOOP WITH OPTIONS(4) PTF RO97371 CICS VERIFY PASSWORD INVALID FACILITY CHECK PTF
More informationJim McNeill. Vanguard Professional Services VSS10 & VSS13
Jim McNeill Vanguard Professional Services VSS10 & VSS13 1 2 Legal Notice Copyright 2017 Copyright by Vanguard Integrity Professionals, Inc. All rights reserved. Unauthorized reproduction, modification,
More informationTECHED USER CONFERENCE MAY 3-4, 2016
TECHED USER CONFERENCE MAY 3-4, 2016 Bob Jeffcott Software AG Big Data Adabas In Memory Data Management with Terracotta 2016 Software AG. All rights reserved. For internal use only AGENDA 1. ADABAS/NATURAL
More informationHow to Get Full Security from Security Software and Tape Management Software Together
How to Get Full Security from Security Software and Tape Management Software Together Monday, August 22, 2005 Session 1714 1:30 Stu Henderson (stu@stuhenderson.com) Russell Witt (russell.witt@ca.com) Abstract
More informationSECURITRE. This document is applicable to the SECURITRE Version software package.
SECURITRE Reference Manual This document is applicable to the SECURITRE Version 3.3.1 software package. Comments pertaining to this document and the SECURITRE package are encouraged. Please direct all
More informationInstalling and Configuring Cisco Unified Real-Time Monitoring Tool
CHAPTER 2 Installing and Configuring Cisco Unified Real-Time Monitoring Tool You can install Cisco Unified Real-Time Monitoring Tool (RTMT), which works for resolutions 800*600 and above, on a computer
More informationBuilding a Case for Mainframe Security
Building a Case for Mainframe Security Dr. Paul Rohmeyer, Ph.D. Stevens Institute of Technology Hoboken, New Jersey June 13-15, 2010 1 AGENDA - Problem Statement - Defining Security - Understanding Mainframe
More informationDATABASE SECURITY REQUIREMENTS GUIDE (SRG) TECHNOLOGY OVERVIEW. Version 2, Release October Developed by DISA for the DoD
DATABASE SECURITY REQUIREMENTS GUIDE (SRG) TECHNOLOGY OVERVIEW Version 2, Release 5 28 October 2016 Developed by for the DoD 28 October 2016 Developed by for the DoD Trademark Information Names, products,
More informationGo USA! Get There Faster. 6/29/2010 Process World
Go USA! Get There Faster. 6/29/2010 Process World 2010 2 Go Germany! Get There Faster. BPM + BI = Process Intelligence Top 10 Business Priorities Rank Top 10 Technology Priorities Rank Business process
More informationNatQuery The Data Extraction Solution For ADABAS
NatQuery The Data Extraction Solution For ADABAS Overview...2 General Features...2 Integration to Natural / ADABAS...5 NatQuery Modes...6 Administrator Mode...6 FTP Information...6 Environment Configuration
More informationCA Top Secret Security for z/os CA RS 1708 Service List
CA Top Secret Security for z/os 16.0 1 CA RS 1708 List Description Type RO91733 CICS: SUPPORT CICS TS (CTS) REL 5.4 FOR Z/OS PTF RO91735 TSS COMMAND ABEND S0C4 IN TSSKERNL PTF RO94015 CICS: SUPPORT CICS
More informationNew Security Options in DB2 for z/os Release 9 and 10
New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and
More informationDon't Judge an LDAP Server By Its Name SHARE Orlando
Saheem Granados,CISSP (sgranado@us.ibm.com) IBM Software Engineer August 2011 Don't Judge an LDAP Server By Its Name SHARE Orlando August 2011 S9545 2009 IBM Corporation IBM Presentation Template Full
More informationWhat it means to be a DBA. Best Practices
What it means to be a DBA Best Practices Natural Conference in Boston, MA August 17-20, 2008 dstorr@storrconsulting.com DBA? Doing Business As Deutsche Ba (German airline) Doctor of Business Administration
More informationCIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1
Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,
More informationADABAS & NATURAL 2050+
ADABAS & NATURAL 2050+ Guido Falkenberg SVP Global Customer Innovation DIGITAL TRANSFORMATION #WITHOUTCOMPROMISE 2017 Software AG. All rights reserved. ADABAS & NATURAL 2050+ GLOBAL INITIATIVE INNOVATION
More informationElectronic Transfer System Electronic Transfer System (ETS) Client Accounts Manual
(ETS) Client Accounts Manual October 2006 1 ETS ACCOUNT... 2 1.1 ETS ACCOUNT (SITE ADMINISTRATOR ACCOUNT)... 2 1.2 CLIENT ACCOUNTS... 2 2 SECURE ETS WEB SITE... 3 2.1 MAIN WEB SITE... 3 2.2 LOGGING ON...
More informationIntroduction to CICS. Course introduction
Introduction to CICS Course introduction Course introduction What is CICS? What is an application server? Why use an application server? Course introduction Services provided by CICS How CICS applications
More informationAuditing and Protecting your z/os environment
Auditing and Protecting your z/os environment Guardium for IMS with IMS Encryption Roy Panting Guardium for System z Technical Sales Engineer March 17, 2015 * IMS Technical Symposium 2015 Agenda Audit
More informationAll About Caches and Buffers
ADABAS All About Caches and s Natural Conference in Boston, PA August 17-20, 2008 dstorr@storrconsulting.com General ASSO DATA C A C H E ADABAS Pool (LBP) ADACSH Hiperspace Dataspace WORK Online SVC /
More informationExpress Setup. System Requirements. Express Setup CHAPTER
3 CHAPTER You access the switch module via the host CGR 2010 router. For more information, see Accessing the Switch Module, page 4-2. To exchange and monitor control messages between the switch module
More informationData encryption & security. An overview
Data encryption & security An overview Agenda Make sure the data cannot be accessed without permission Physical security Network security Data security Give (some) people (some) access for some time Authentication
More informationHIPAA Privacy & Security Training. Privacy and Security of Protected Health Information
HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security
More informationIBM Tivoli Access Manager for e-business V6.1.1 Implementation
000-039 IBM Tivoli Access Manager for e-business V6.1.1 Implementation Version 14.23 Topic 1, Volume A QUESTION NO: 1 What is included in the high level configuration document when WebSEAL clustering must
More informationUsing the Cisco Unified Analysis Manager Tools
CHAPTER 17 The Unified Analysis Manager provides a set of tools that allow you to perform management tasks for specific devices and groups of devices. The following sections describe the tasks you can
More informationBUILDING BRIDGES. SMART DCI plugs your legal application into the new world. ADABAS/Natural
BUILDING BRIDGES SMART DCI plugs your legal application into the new world /Natural page 2 of 12 Whitepaper SmartDCI Contents 1. The SmartDCI Product Range.............................................................
More informationSecurity zsecure Visual Version Client Manual SC
Security zsecure Visual Version 2.1.0 Client Manual SC27-5647-00 Security zsecure Visual Version 2.1.0 Client Manual SC27-5647-00 Note Before using this information and the product it supports, read the
More informationMusewerx support for Application Maintenance in Software AG NATURAL and ADABAS TM environment
Musewerx support for Application Maintenance in Software AG NATURAL and ADABAS TM environment Musewerx provides Application Maintenance Services for your applications written in NATURAL and ADABAS environment.
More informationConfiguring the Cisco APIC-EM Settings
Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page
More informationHints and Tips for Using webmethods EntireX v7.3 About the Author Introduction webmethods EntireX
April 2008 Hints and Tips for Using webmethods EntireX v7.3 By Neil Beesley, Founding Member and Enterprise Software Specialist, Commutual Technical Consulting, LLC About the Author Neil Beesley has spent
More informationHow to use VPN L2TP over IPsec
How to use VPN L2TP over IPsec Server/Client on TW-EAV510 AC Note: 1. Please make sure that both LAN side networks are in different subnet. 2. Just some OS support L2TP Tunnel authentication, like Android
More informationJohn Hilman. Vanguard Professional Services BAS08
John Hilman Vanguard Professional Services BAS08 1 2 Legal Notice Copyright 2017 Copyright by Vanguard Integrity Professionals, Inc. All rights reserved. Unauthorized reproduction, modification, publication,
More informationCIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1
Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.
More informationOracle WebLogic Server 12c: Administration I
Oracle WebLogic Server 12c: Administration I Duration 5 Days What you will learn This Oracle WebLogic Server 12c: Administration I training teaches you how to install and configure Oracle WebLogic Server
More informationCIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1
Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5
More informationWRE6505 v2. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 10/2016
WRE6505 v2 Wireless AC750 Range Extender Version 1.00 Edition 1, 10/2016 Quick Start Guide User s Guide Default Login Details Web Address http://zyxelsetup http://dhcp-assigned IP www.zyxel.comhttp://192.168.1.2
More informationOverview Guide. Mainframe Connect 15.0
Overview Guide Mainframe Connect 15.0 DOCUMENT ID: DC37572-01-1500-01 LAST REVISED: August 2007 Copyright 1991-2007 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and
More informationBACKUP APP V7 MICROSOFT EXCHANGE DATABASE BACKUP AND RESTORE GUIDE
V7 MICROSOFT EXCHANGE DATABASE BACKUP AND RESTORE GUIDE Revision History Date Descriptions Type of modification 15 July 2016 First Draft New 3 February 2017 Added instructions and screen shots for Encryption
More informationEntireX 8.2 New Features - Highlights -
EntireX 8.2 New Features - Highlights - Juergen Lind Sr. Product Manager / May 2011 Software AG provides no commitment to deliver any of the features described herein, and reserves the right to change
More informationWhat's Missing in Mainframe InfoSec: (What We Don't Know We Don't Know)"
What's Missing in Mainframe InfoSec: (What We Don't Know We Don't Know)" Stu Henderson stu@stuhenderson.com 5702 Newington Road www.stuhenderson.com Bethesda, MD 20816 (301) 229-7187 ABSTRACT 2 In this
More informationPresented by Jim McNeill Vanguard Professional Services
Presented by Jim McNeill Vanguard Professional Services 2016 Vanguard Integrity Professionals, Inc. 1 Legal Notice Copyright 2016 Vanguard Integrity Professionals, Inc. All Rights Reserved. You have a
More informationN2O. Administrator Manual
N2O Administrator Manual Note: All references to the N2O version in this manual are indicated by vrs or v.r.s. The current release of N2O is version 5.3.1. This document is applicable to N2O and N2O/3GL
More informationSecurity and Authentication
Security and Authentication Authentication and Security A major problem with computer communication Trust Who is sending you those bits What they allow to do in your system 2 Authentication In distributed
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer
Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also
More informationConfiguring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.
Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure
More informationRocket Software Strong Authentication Expert
RSA SecurID Ready Implementation Guide Last Modified: May 5, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description Rocket Software www.rocketsoftware.com
More informationThe Old is New Again Engineering Security in the Age of Data Access from Anywhere
The Old is New Again Engineering Security in the Age of Data Access from Anywhere Paul de Graaff Chief Strategy Officer Vanguard Integrity Professionals March 10, 2014 Session 14971 AGENDA History 1 This
More informationExtended Search Administration
IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using
More informationCA ACF CA RS 1705 Service List
CA ACF2 16.0 1 CA RS 1705 List Description Type RO92798 LDS SSL INIT FAILS W/CAS2386W PTF RO93394 ACF89001 VSAM I/O ERROR WITH SHARED DASD AND CACHE PTF RO93615 ABEND S0E0 IN SAFOEUSP ON A INIT_USP CALL
More informationConfiguring the Client Adapter through the Windows XP Operating System
APPENDIX E Configuring the Client Adapter through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in
More informationInformation Security CS 526
Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric
More informationWF-2402 Quick Installation Guide
WF-2402 Quick Installation Guide Netis 150Mbps Wireless-N Broadband Router 1. Check Your Package Contents The following items should be found in your package: 150Mbps Wireless-N Broadband Router Power
More informationDigipass Plug-In for SBR. SBR Plug-In SBR. Steel-Belted RADIUS. Installation G uide
Digipass Plug-In for SBR SBR Plug-In SBR Steel-Belted RADIUS Installation G uide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product
More informatione-commerce Study Guide Test 2. Security Chapter 10
e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the
More information8/3/17. Encryption and Decryption centralized Single point of contact First line of defense. Bishop
Bishop Encryption and Decryption centralized Single point of contact First line of defense If working with VPC Creation and management of security groups Provides additional networking and security options
More informationCIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1
Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present
More informationLegal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationInstalling and Configuring Cisco Unified Real-Time Monitoring Tool
CHAPTER 2 Installing and Configuring Cisco Unified Real-Time Monitoring Tool You can install Cisco Unified Real-Time Monitoring Tool (RTMT), which works for resolutions 800*600 and above, on a computer
More informationUSER MANUAL SNMP-RC210 SNMP WEB MANAGEMENT CARD. bxterra.com
USER MANUAL SNMP-RC210 SNMP WEB MANAGEMENT CARD bxterra.com TABLE OF CONTENTS INTRODUCTION... INSTALLATION... SNMP MANAGER GUI... SNMP MANAGER FUNCTIONS MENU... SETTINGS... ONLINE UPGRADE... SYSTEM MANAGER...
More informationSIMATIC NET. Industrial Ethernet Security SCALANCE S615 Getting Started. Preface. Connecting SCALANCE S615 to the WAN 1
Preface Connecting SCALANCE S615 to the WAN 1 SIMATIC NET VPN tunnel between SCALANCE S615 and 2 SINEMA RC Server Industrial Ethernet Security Getting Started 07/2017 C79000-G8976-C390-02 Legal information
More informationMySQL for Database Administrators Ed 4
Oracle University Contact Us: (09) 5494 1551 MySQL for Database Administrators Ed 4 Duration: 5 Days What you will learn The MySQL for Database Administrators course teaches DBAs and other database professionals
More informationSAS/ACCESS Interface to R/3
9.1 SAS/ACCESS Interface to R/3 User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS/ACCESS 9.1 Interface to R/3: User s Guide. Cary, NC: SAS Institute
More informationImproving the performance of webinitiated CICS transaction workloads
Improving the performance of webinitiated CICS transaction workloads Patrick Fournier Serge Bourlot John Bachiochi (SysperTec) Tuesday, August 13, 2013 (12:15 to 1:15 PM) Session # 13456 Presenters Bio
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1Y0-A15 Title : Engineering a Citrix Virtualization Solution Vendors : Citrix
More informationIBM Data Virtualization Manager for z/os Version 1 Release 1. Installation and Customization Guide IBM GC
IBM Data Virtualization Manager for z/os Version 1 Release 1 Installation and Customization Guide IBM GC27-8874-00 Note Before using this information and the product it supports, read the information in
More information