Your Browser is not longer supported

Please use Google Chrome, Mozilla Firefox or Microsoft Edge to view the page correctly
Loading...

{{viewport.spaceProperty.prod}}

Defining system access control

System access control is only relevant for real user IDs and is generated in the USER statement.

You define system access control by assigning a password to each user ID and by specifying a minimum length, a certain level of complexity, and a minimum and a maximum validity period for the password.

USER userid-name,PASS=password,PROTECT-PW=complexity-level

On signing on, the user must pass the specified authorization data configured for userid-name to openUTM.

On BS2000 systems, a magnetic strip card can also be configured as an access requirement for a user ID.

In addition, on BS2000 systems an access check using Kerberos can be generated as an alternative to a password and/or magnetic strip card.

Generating system access control using Kerberos (BS2000 systems)

The following generation statements are of significance for generating access control using the distributed authentication service Kerberos:

  • LTERM KERBEROS-DIALOG=

    If you specify LTERM KERBEROS-DIALOG=YES, a Kerberos dialog is carried out when a connection is established for terminals that support Kerberos and that connect to the application directly via this LTERM partner (not via OMNIS) (see "LTERM - define an LTERM partner for a client or printer").

  • TPOOL KERBEROS-DIALOG=

    If you specify TPOOL KERBEROS-DIALOG=YES, a Kerberos dialog is carried out when a connection is established for terminals that support Kerberos and that connect to the application directly via this terminal pool (not via OMNIS) (see "TPOOL - define an LTERM pool").

  • USER PRINCIPAL=

    When you specify USER PRINCIPAL=characterstring, the user is authenticated via Kerberos with the help of this string (see "USER - define a user ID").

openUTM stores the Kerberos information in the length resulting from the maximum lengths generated for MAX PRINCIPAL-LTH and MAX CARDLTH (see "MAX - define UTM application parameters"). If the Kerberos information is longer, it is truncated to this length and stored.