z/OS Common Information Model User's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Granting clients and administrators access to the CIM server

z/OS Common Information Model User's Guide
SC34-2671-00

Granting clients and administrators access to the CIM server

The CIM server authenticates users with the z/OS Security Server to determine which users can log into it. Authentication is performed for every new connection (local or remote) before a user is granted access to the CIM server.

For the CIM server for z/OS, users log on over HTTP or HTTPS using basic authentication or certificate authentication. When logging on, users are authenticated using their z/OS user ID and password as defined, for example, in RACF®.

To access the CIM server, a user must be at least linked to a group with READ access to RACF profile CIMSERV. In order to use any of the administrative command-line tools of the CIM server, as described in CIM server command-line utilities and console commands, a group instead requires CONTROL access to the CIMSERV profile.

For detailed information about the required access rights, see the following table.

Table 2. Access types required for CIM operations
CIM operation typeCIM operationsRACF access
Basic readGetClass, EnumerateClasses, EnumerateClassNames, GetInstance, EnumerateInstance, EnumerateInstanceNames, GetProperty, GetQualifier, EnumerateQualifierREAD
Basic writeSetPropertyUPDATE
"Method"ExecuteMethodUPDATE
Schema ManipulationCreateClass, ModifyClass, DeleteClassCONTROL
Instance ManipulationCreateInstance, ModifyInstance, DeleteInstanceUPDATE
Indication SubscriptionCreateInstance, ModifyInstance, DeleteInstanceUPDATE
Association TraversalAssociators, AssociatorNames, References, ReferenceNamesREAD
QueryExecQueryREAD
Qualifier DeclarationSetQualifier, DeleteQualifierCONTROL

The following example shows how to define UPDATE access for a client group called CFZUSRGP:

Example:

PERMIT CIMSERV CL(WBEM) ACCESS(UPDATE) ID(CFZUSRGP)
SETROPTS RACLIST(WBEM) REFRESH

In addition, the CIM server user ID must be defined as a surrogate of the client user ID (see Switching identity (surrogate)).

To enable a user to use the command line tools, set up the UNIX System Services environment as described in Customizing the UNIX System Services shell.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014