l3c2ops400.ppt1 lecture 3 review of concepts security assistance profiles library list authority

41
L3C2ops400.ppt 1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

Upload: philomena-horn

Post on 17-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

L3C2ops400.ppt 1

Lecture 3

REVIEW of conceptssecurity

assistanceprofiles

Library listauthority

Page 2: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

2

AS/400 Architecture• Object-based architecture• The Machine Interface (MI) translates

instructions from the logical machine (OS/400 and application programs) to the physical machine (the hardware).

• The MI insulates the logical machine from the physical

• There are many advantages to this:

Page 3: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

3

Architecture cont’d

• Single level storage– main and secondary memory (RAM & disk)

are treated as a single mass

– no hardware oriented considerations (eg. Managing disk drives)

– because memory is managed by internal code, objects can be shared by different jobs.

Page 4: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

4

Licensed ProgramsLicensed Internal Code

• Application Development Tools – PDM (you have been using since the first lab)

• OfficeVision– similar to MS-Office, but AS/400 based

• Communication SupportClient Access

Mocha• Programming Languages

– Pascal, PL/1, Basic, RPG, C, C++, Cobol, Java, SQL, etc.

Page 5: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

5

Commonly Used Function Keys

• F1 = Help• F2 = Extended Help• F3 = Exit command

completely• F4 = Prompt• F5 = Refresh

Screen

• F9 = Retrieve Previous Command

• F12 = Cancel current level and return to previous level in command

• F23 = more options• F24 = more functions

Page 6: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

6

Commonly Used Options on LIST type screens

• 2 = Edit• 3 = Copy• 4 = Delete• 5 = Display• 5* = Some cases

Work With• 6 = Print

• 7 = Rename• 8 = display

Description• 9 = Save• 12 = Work With• 14 = Compile /

Generate

When applicable!

Page 7: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

7

* On the AS/400

• The * (asterisk or star) when used before a parameter value denotes a special value.Eg. *all, *libl, *curlib

• When the * is used after a parameter value, it is a wild card (just like in DOS) Eg. WRKUSRPRF DB400*

Page 8: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

8

Using F4 and ?

• The ? is used the same way F4 is.

• Entered into a command field, it gives you the possible values for the field.

• Entered before a command, puts you in prompt mode for that command.

Eg. ?CRTLIB

Page 9: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

9

STORAGE HIERARGY

• Library: an object whose purpose is to ‘store’ and index other objects. ie. objects are ‘stored’ in libraries.

• Files: objects that store data

• Members: Source files have many ‘members’

each source program = one memberData Files: most common 1 member

only exception multiple members (multi territory, multi company)

Page 10: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

10

Hierarchy of Storing Objects

• When an object is created, it is stored in the library specified.

• If no library is specified, it is stored in *CURLIB (current library).

• If there is no current library, it is stored in QGPL library.

• Exception: Libraries, Device Descriptions and User Profiles are always stored in library QSYS.

Page 11: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

11

Work with Members Using PDM File . . . . . . QCLSRC Library . . . . OPS234LIB Position to . . . . . Type options, press Enter. 2=Edit 3=Copy 4=Delete 5=Display 6=Print 7=Re 8=Display description 9=Save 13=Change text 14=Compile 15=Cr Opt Member Type Text ___ BIRTHDAY CLP ___ CH11TIM CLP Chapter 11 CL program demo version ___ LAB4CLP CLP Lab 4 CL program ___ SHELL CLP CL program shell

Page 12: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

12

or GO CMD??? GO CMDDSP• GO CMDWRK• GO CMDACT• GO CMDUSR• CMDCPY Copy Commands

CMDDSP Display Commands

CMDWRK Work With Commands

CMDLIB Library Commands

CMDMSG Message Commands

CMDOUTQ Output Queue Commands

CMDUSRPRF User Profile Commands

ETC. ETC

Page 13: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

13

GO Verb Menu

Page 14: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

14

Physical

Locked accessDamage control ofprocessor, devices andmedia from fire, floodetc.

Data

All the digital information

User Programs, O/S, Utilities, data integrity

SECURITY

Object based / User based

AS/400 uses a combinationof both to ensure the MOSTsecure environment tooperate in.

Page 15: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

15

DATA SECURITY cont’d

System Level - system values / levels 10 - 50

user profiles - unique and password protectedcontrols authorities, ownership,environment, user groupQSECOFR, QSECADM, QSYSOPR, QPGMR, QUSER etc…

Object - access authority to object foreach user authority lists for groups

- *ALL *CHANGE *USE *EXCLUDE

Page 16: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

16

special AUTHORITIES requiredfor CERTAIN FUNCTIONS

*ALLOBJ *AUDIT *IOSYSCFG

*JOBCTL *NONE *SAVSYS

*SECADM *SERVICE *SPLCTL

See page 22 of text book

Page 17: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

17

Page 18: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

18

Display Authorization List Object . . . . . . . : OPSPRF Owner . . . . . . . : ADMIN Library . . . . . : QSYS Primary group . . . : *NONE Object List ----------Object----------- User Authority Mgt Opr Mgt Exist Alter Ref ADMIN *ALL X X X X X X MOOGK *ALL X X X X X ABERNS *ALL X X X X X DMENKEN *ALL X X X X X LYDIA_LI *ALL X X X X X CREER *ALL X X X X X

*PUBLIC USER DEF X Press Enter to continue. F3=Exit F11=Display data authorities F12=Cancel

F15=Display authorization list objects F17=Top F18=Bottom

Authorization lists - AUTL OBJECT AUTHORITY

Page 19: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

19

Display Authorization List Object . . . . . . . : OPSPRF Owner . . . . . . . : ADMIN Library . . . . . : QSYS Primary group . . . : *NONE Object ---------------Data--------------- User Authority Read Add Update Delete Execute ADMIN *ALL X X X X X MOOGK *ALL X X X X X ABERNS *ALL X X X X X DMENKEN *ALL X X X X X LYDIA_LI *ALL X X X X X PANGBORN *ALL X X X X X CREER *ALL X X X X X Press Enter to continue. F3=Exit F11=Nondisplay detail F12=Cancel F15=Display authorization list objects F17=Top F18=Bottom

Authorization lists - AUTLDATA AUTHORITY

Page 20: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

20

How the AS/400 finds Objects

• When an object is created, it is created ‘in’ a particular library.

• To access an object, the AS/400 needs to know what library the object is in.

• (CL) Commands prompt you for the object name and library name.

• *LIBL is the default entry for a library parameter name request

Page 21: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

21

Qualified Name vs SIMPLE Name

• If you specify an object name and library, it is called a qualified name) e.g. Call OPS234LIB/PGM01

• When you use the object name by itself it is called a simple name and then the *LIBL is used to find the object .e.g. Call PGM01

Page 22: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

22

Library Liststype *LIBL

• A list of Libraries, in order of importance

• Similar to the DOS ‘Path’ concept

• Each Job has it’s own library list(Can be inherited)

• It determines where a Job finds Objects when SIMPLE naming is used

Page 23: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

23

Library Lists cont’d

• Each Library List consists of 4 parts:– System Libraries (up to 15)– Product Libraries (none, 1 or 2)– Current Library(1 only)– User Library ( up to 25)

• To view your library list - DSPLIBL

Page 24: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

24

Library List cont’d

Page 25: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

25

Library List cont’d

• Determine where a Job finds Objects when

SIMPLE NAMING

is used v.s.

???????????????

Page 26: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

26

How / when is a Library List created?

• When you sign on (start a session), your library list is built from:– QSYSLIBL (system value)– QUSRLIBL (system value)– Current library from User Profile– Associated JOB description *JOBD initial user

list part• INHERETED from the parent job (process).• Product libraries are added as needed by the

system

Page 27: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

27

System Values

• These values define what the default values will be.

• You can’t change them, but you can look at them.

• See page 4 of text for examples

Page 28: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

28

System Values are used for Control and configuration attributes

System values are AS/400 attributes that allow each installation to customize the machine to the organization’s own needs and specifications.

-The categories of system values include : Date and time System control Library list values

Editing values Allocation values Security values Storage values Message and logging values

DSPSYSVAL QDATE

Page 29: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

29

MAIN AS/400 Main Menu System: ODIN Select one of the following: 1. User tasks 2. Office tasks 3. General system tasks 4. Files, libraries, and folders 5. Programming 6. Communications 7. Define or change the system 8. Problem handling 9. Display a menu 10. Information Assistant options 11. Client Access/400 tasks 90. Sign off Selection or command ===> DSPSYSVAL <F4> F3=Exit F4=Prompt F9=Retrieve F12=Cancel F13=Information Assistant F23=Set initial menu

Page 30: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

30

Display System Value (DSPSYSVAL)

Type choices, press Enter. ____________ F4 System value . . . . . . . . . . QABNORMSW, QACGLVL... Output . . . . . . . . . . . . . * *, *PRINT

Specify Value for Parameter SYSVAL

Type choice, press Enter. System value . . . . . . . . . . QABNORMSW QAUDLVL QACGLVL QAUTOCFG QACTJOB QAUTORMT QADLACTJ QAUTOSPRPT QADLSPLA QAUTOVRT QADLTOTJ QBASACTLVL QALWOBJRST QBASPOOL QALWUSRDMN QBOOKPATH QASTLVL QCCSID QATNPGM QCENTURY QAUDCTL QCFGMSGQ QAUDENDACN QCHRID QAUDFRCLVL QCHRIDCTL + F3=Exit F5=Refresh F12=Cancel F13=How to use this display F24=More keys

Page 31: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

31

QAUDJRN QAUDLVL QCRTAUT QDSPSGNINF QMAXSIGN QMAZSGNACN QLMTDEVSSN QINACTIT QINACTMSGQ QDSCJOBITV QUPSMSGQ QUPSDLYTIM QPWRRSTIPL QSECURITY ........

SECURITY RELATED SYSTEM VALUES

Page 32: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

32

Display System Value (DSPSYSVAL)

Type choices, press Enter. System value . . . . . . . . . . > QSECURITY... Output . . . . . . . . . . . . . * *, *PRINT

Display System Value

System value . . . . . : QSECURITY Description . . . . . : System security level System security level . . . : 40 10=Physical security only (no longer supported) 20=Password security only 30=Password and object security 40=Password, object, and operating system integrity 50=Password, object, and enhanced operating system integrity

5 LEVELS USER DEPENDEND AND ASSIGNED BY THE SYSADM

<ENTER>

Page 33: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

33

AUTHORITY System value . . . . . : QCRTAUT Description . . . . . : Create default public authority Create default public authority . . . . . : *CHANGE *CHANGE *ALL *USE

*EXCLUDE

Page 34: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

34

Assistance Levels

• Determines how much information is displayed and how it is formatted.

• Basic, Intermediate, Advanced, default on USRPRF

• Page 19 in text.• Try it out for yourself using the

WRKSPLF command and function key F21

Page 35: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

35

Display System Value System value . . . . . : QASTLVL Description . . . . . : User assistance level Assistance level . . . : *BASIC *BASIC *INTERMED *ADVANCED ..............................................................................: QASTLVL - Help :: :: Assistance level. Specifies the level of assistance available to users :: of the system. This system value is used to tailor the level of :: displays available for users of the system. Displays intended for less :: experienced users provide a higher level of assistance than do displays :: intended for expert users. :: :: A change to this system value takes effect the next time a user signs :: on. The shipped value is *BASIC. :: Bottom :: F2=Extended help F3=Exit help F10=Move to top F12=Cancel :: F13=Information Assistant F14=Print help :: ::............................................................................:

Press Enter to continue. F3=Exit F12=Cancel

Page 36: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

36

USER and the associated classes

................................................................: User Class - Help :: :: The type of user. User class is one of the following: :: o *PGMR - Programmer :l o *SECADM - Security administrator :: o *SECOFR - Security officer : o *SYSOPR - System operator o *USER - User

A user can belong to a group and obtainsall the group assigned authorities and securities

Page 37: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

37

USER and the associated classes

Display User Profile - Basic User profile . . . . . . . . . . . . . . . : DB400A01 Previous sign-on . . . . . . . . . . . . . : Sign-on attempts not valid . . . . . . . . : 0 Status . . . . . . . . . . . . . . . . . . : *ENABLED Date password last changed . . . . . . . . : 01/08/01 Password expiration interval . . . . . . . : *SYSVAL Set password to expired . . . . . . . . . : *NO User class . . . . . . . . . . . . . . . . : *PGMR Special autho ................................................................Group profile : User Class - Help :Owner . . . : :Group authori : The type of user. User class is one of the following :Group authori : o *PGMR - Programmer : Supplemental : o *SECADM - Security administrator :Assistance le : o *SECOFR - Security officer :Current libra : o *SYSOPR - System operator : o *USER - User :Press Enter t : F2=Extended help F10=Move to top F12=Cancel : : F13=Information Assistant F20=Enlarge F24=More keys :F3=Exit F12 : :(C) COPYRIGHT :..............................................................:

Page 38: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

38

Display Job Description System: ODIN Job description: QBATCH Library: QGPL User profile . . . . . . . . . . . . . . . . . . : QPGMR CL syntax check . . . . . . . . . . . . . . . . : *NOCHK Hold on job queue . . . . . . . . . . . . . . . : *NO End severity . . . . . . . . . . . . . . . . . . : 30 Job date . . . . . . . . . . . . . . . . . . . . : *SYSVAL Job switches . . . . . . . . . . . . . . . . . . : 00000000 Inquiry message reply . . . . . . . . . . . . . : *RQD Job priority (on job queue) . . . . . . . . . . : 5 Job queue . . . . . . . . . . . . . . . . . . . : QBATCH Library . . . . . . . . . . . . . . . . . . . : QGPL Output priority (on output queue) . . . . . . . : 5 Printer device . . . . . . . . . . . . . . . . . : *USRPRF Output queue . . . . . . . . . . . . . . . . . . : *USRPRF Library . . . . . . . . . . . . . . . . . . . : More...

Press Enter to continue.

DSPJOBD QBATCH First page of job attributes

Page 39: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

39

Operations Navigator the GUI Interface

Page 40: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

40

from seneca home page select ACS select info center select server related info select AS400 select client access setup instructions

The instructions there might help you

Installing Client Access

with Operations Navigator

http://acs.senecac.on.ca/as400/clientaccess.html

Page 41: L3C2ops400.ppt1 Lecture 3 REVIEW of concepts security assistance profiles Library list authority

41

For Next Week

• Study chapter 2

• Read Chapter 3

• Be present AT and DO your LAB