[z/OS]

Audit support

This topic gives an overview of how to use audit support.

Auditing is performed using SMF records issued by RACF® or an equivalent External Security Manager. This means that SMF audit records are cut as part of the WebSphere Application Server use of SAF interfaces and RACROUTE macros.

WebSphere Application Server for z/OS makes use of the following RACROUTE macros:
  • RACROUTE REQUEST AUTH (and FASTAUTH) - to check if a user is authorized to a class
  • RACROUTE REQUEST=EXTRACT - to extract a RACO from an ACEE
  • RACROUTE REQUEST TOKENXTR - to extract the UTOKEN (for CICS)
  • RACROUTE REQUEST LIST - to check if the FASTAUTH routines can use the in-storage copies of the general-resource profiles for authorization checking
  • RACROUTE REQUEST STAT - to determine if certain classes are active
and of the following SAF APIs:
  • initACEE (IRRSIA00) - to manage ACEEs
  • R_usermap (IRRSIM00) - map a Kerberos principal name to a RACF user ID

For more information on the SMF auditability of the RACROUTE and SAF API calls that WebSphere Application Server uses, refer to the RACROUTE Macro Reference documentation and the Security Server RACF Callable Services documentation, respectively, in the z/OS Information Center that is appropriate for your version of z/OS.

Table 1. Security authentication mechanisms and the corresponding data that is written to each part of the ACEE X500NAME field. The following table lists the various security authentication mechanisms and the corresponding data that is written to each part of the ACEE X500NAME field (this data is also in the RACO and SMF records).
Authentication mechanism Service name Authenticated identity
Custom Registry WebSphere® Custom Registry Custom registry principal name
Kerberos Kerberos for WebSphere Application Server Kerberos principal, in the "DCE" format used for extracting the corresponding MVS™ userid using IRRSIM00 (/.../realm/principal)
RunAs Rolename WebSphere Role Name Role name
RunAs Server WebSphere Server Credential MVS userid
Trust Interceptor WebSphere Authorized Login MVS userid
RunAs Userid/Password WebSphere Userid/Password MVS Userid
In addition to tracking by MVS userid, events need to be traced to an originating userid. This is especially true for originating userids that are not MVS-based, such as EJB Roles, Kerberos principals, and Custom Registry principals.
Reference topic    

Terms and conditions for information centers | Feedback

Last updated: April 20, 2014 08:46 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=phil&product=was-nd-mp&topic=rtrb_SMFusingaudit
File name: rtrb_SMFusingaudit.html