Security Milestones in Connector RRSF Support
This section describes security milestones along the path of a password change event shipped between components of the Connector RRSF Support feature, as illustrated in the figure in Connector for RACF RRSF Support.
Milestones on the non-managed node:
-
The ICHRIX02 exit traps the user-initiated password change event and sends the event to the local Connector Online Interceptor using the regular Connector for RACF secure cross-memory channel.
-
The Connector Online Interceptor encapsulates the new password in the password keyword of the special ALTUSER command; therefore the password is not displayed in the RRSFLIST logs used by RRSF. An example of a log dataset name is STCUSER.RRSFLIST, where the Connector Online Interceptor runs under the RACF user STCUSER.
-
The Connector Online Interceptor started task on the non-managed node is run under a RACF user that: - Must be defined (using the RCFRRSTB table) to the IRREVX01 component on the managed node - Must be authorized to direct RRSF commands to the target managed node
Milestones on the managed node:
-
The CTSEVX01 exit prevents impersonation of the source of the RRSF-inbound RACF command by using the RCFRRSTB mechanism. For more information, see Customizing the RCFRRSTB Table.
-
After interpreting the RRSF-inbound RACF command, CTSEVX01 forwards the password change event to local Connector Online Interceptor, using Connector built-in cross memory channels.
-
As a RACF exit, CTSEVX01 fails (does not execute) the command that contains the password change event; therefore there is no SMF recording of the RACF command with password value.
-
If module CTSEVX01 is not defined as RACF exit IRREVX01, the encapsulated ALTUSER command will be executed in the managed RACF system. This command will fail, as it refers to a dummy user name that does not exist in the managed RACF system. The failed command is not logged in SMF and the password is not exposed.