|
Tom: In order to make all the parts of our Automatic Partition Resource Manager (APRM(R)) product work we need almost all of what QSECOFR has. There are 8 special authorities (*ALLOBJ, *AUDIT, *IOSYSCFG, *JOBCTL, *SAVSYS, *SECADM, *SERVICE and *SPLCTL) we need all of these except *SAVSYS and *AUDIT. Well, we _could_ get along without *ALLOBJ, but we would need a _lot_ of private authorities to IBM-supplied objects like commands and APIs. And that list tends to change as the product matures and has to support new hardware and new IBM code. We do need 2 profiles for our product: an "object owner" profile with a lot of authority so we create it with a password of *NONE and therefore cannot be used to sign-on. All of our programs adopt that "owner" profile's authority but include their own checking of the user's authority (to functions within the product) to do or not do what the user asks. We also need a separate profile because we need to use (at least on iSeries hardware) the only IBM API that allows LPAR configuration and THAT API requires an OS/400 user profile AND a service tool (DST) user profile with the same name and the same encrypted password. Both of these must NOT be expired. I didn't make this up - IBM did - "for security reasons". Not only that, but DST expires its users every 180 days - no choices. As you know, OS/400 has a LOT of password system value controls. The good news here is that none of these password rules is applied to the CHGUSRPRF command - they only work with normal CHGPWD and the sign-on situation where your password has already expired. We pride ourselves in marketing a product that many customers have been able to install and configure with only normal operations personnel and some telephone support. We do provide easy-to-follow instructions in our technical manual. Now, not everybody is a security expert. If we were to list the 6 special authorities we need to have and tell our potential customers to sign-on with "enough" authority to create the user profiles we will use and to install the product library and create the other objects, change an IBM subsystem to add an auto-start job entry for our product, etc., I think we would be doing them no service at all. EVERYBODY understands "sign-on with QSECOFR authority". Again, we do list, in full as part of our documentation, all of the things we create and we include instructions for _completely_ removing our product and its changes. The idea is to make it easy for the customer, not complicated. Dave - - - - - - - Tom Liotta wrote - - - - - - - date: Thu, 15 Jun 2006 19:10:06 -0400 from: qsrvbas@xxxxxxxxxxxx subject: RE: Installing 3rd Party Software using QSECOFR midrange-l-request@xxxxxxxxxxxx wrote: > 5. Re: Installing 3rd Party Software using QSECOFR (Dave Schnee) > >This is in response to many posts about requiring QSECOFR authority to install a software package and why that's always absolutely terrible and unnecessary. > >Sometimes, it is needed. > >We market a product that requires QSECOFR authority to install. We are not IBM. Dave: I don't mind hearing about valid exceptions; it'll be a long time before I know everything. Perhaps it would be worthwhile to supply a general description of the need and involved objects to security/auditing companies such as my employer. We could, for example, possibly add your objects to lists of exceptions that we distribute inside of our ComplianceMonitor product. We are looking at various default "templates" for a lack of a better term. Companies that have your products might then be able simply to click on a "Barsa Consulting" block and have it automatically included in the exceptions they allow rather than needing to contact you and enter a list manually. >We include a section in our technical manual entitled "Show this section >to your security auditor" - because we're proud of the way we have handled >security issues to provide full capabilities without security exposure. <snip general discussion of multiple needed authorities> >We also run in multiple partitions of a System i server and propagate our >own software updates, when installed, from one partition to another and >automatically reinstall the upgrade for the user's convenience. Multi-system/LPAR/single-hardware-platform and control over all data transfer encryption -- certainly candidates for QSECOFR though I haven't heard specific examples. The LPAR management stuff is definitely outside my day-to-day though. If you know particular examples for QSECOFR requirement, it'd be a service to everyone else to let us know what they are. While needing a number of special authorities makes the use of QSECOFR convenient, it might also be convenient for customers to use a separate *SECOFR profile. But if a requirement exists, general education is best, IMO. Most often to me, that means discussion on this list. I use IBM's Software Product APIs to create, save, restore, delete and license some of our products, including licensing by LPAR. And it takes a bunch of special authority to install many of our products for many of the same reasons you listed. But I haven't seen a requirement for QSECOFR yet. I'm always willing to learn. Tom Liotta -- Tom Liotta The PowerTech Group, Inc. 19426 68th Avenue South Kent, WA 98032 Phone 253-872-7788 x313 Fax 253-872-7904 http://www.powertech.com
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.