z/OS DFSMS Using Data Sets
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


User-Security-Verification Routine

z/OS DFSMS Using Data Sets
SC23-6855-00

If you use VSAM password protection, you can also have your own routine to check a requester's authority. Your routine is invoked from OPEN, rather than via an exit list. VSAM transfers control to your routine, which must reside in SYS1.LINKLIB, when a requester gives a correct password other than the master password.

Recommendation: Do not use VSAM password protection. Instead, use RACF or an equivalent product.

Through the access method services DEFINE command with the AUTHORIZATION parameter you can identify your user-security-verification routine (USVR) and associate as many as 256 bytes of your own security information with each data set to be protected. The user-security-authorization record (USAR) is made available to the USVR when the routine gets control. You can restrict access to the data set as you choose. For example, you can require that the owner of a data set give ID when defining the data set and then permit only the owner to gain access to the data set.

If the USVR is being used by more than one task at a time, you must code the USVR reentrant or develop another method for handling simultaneous entries.

When your USVR completes processing, it must return (in register 15) to VSAM with a return code of 0 for authority granted or not 0 for authority withheld in register 15. Table 1 gives the contents of the registers when VSAM gives control to the USVR.

Table 1. Communication with user-security-verification routine
Register Contents
0 Unpredictable.
1 Address of a parameter list with the following format:

44 bytes    Name of the data set for which authority to process is to be verified (the name you specified when you defined it with access method services)

8 bytes     Prompting code (or 0's).

8 bytes     Owner identification (or 0's).

8 bytes     The password that the requester gave (it has been verified by VSAM).

2 bytes     Length of the user-security-authorization routine (in binary).

–     The user-security-authorization.

2-13 Unpredictable.
14 Return address to VSAM.
15 Entry address to the USVR. When the routine returns to VSAM, it indicates by the following codes in register 15 if the requester has been authorized to gain access to the data set:

0     Authority granted.

not 0  Authority withheld.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014