SSA - The Scheduler for z/OS
Simplify TSO RACF administartion by scheduling automatic commands.
Smart Security Administrator is the easiest RACF administrative package available, SSA goes one step further by enhancing the user experience compared to other products. SSA is an extremely effective merging of Ease-of-Use and Power. A smarter and more sophisticated product means administrators and auditors alike can easily become acclimated and productive at new levels. SSA will assist the security administrator, security coordinator or auditor to effectively maintain and audit RACF information with concise reporting, command generation and ease of use.
SSA is engineered to save the administrator at least 30% of their time by eliminating or expediting those tasks that can be arduous or lengthily in time. With SSA, you are freed up to pursue those items that you may have put aside because of time restraints. SSA will make you a better administrator, coordinator or auditor.
The SSA Suite:
The Scheduler is an optional component for SSA is a scheduling facility would prove useful as a request system interface that handles decentralized security for administrators, coordinators, and auditors.
Security administrators need an automated facility to submit requests and update profiles at designated intervals. Because of security implications associated with typical Schedulers, administrator are obligated to monitor requests and updates. Security administrators also need a facility to manually enter and submit requests and updates. A scheduling facility would prove useful as a request system interface that handles decentralized security for administrators, coordinators, and auditors.
The Scheduler meets these requirements and more. Below is a list of its capabilities and their applications:
- The Scheduler is a automated system with a started task at the core of the facility. The task verifies and submits requests entered by all users and administrators. Thetask automatically scans and submits verified scheduled requests.
- The Scheduler started task can submit requests with its own authority, or the authority of the requester. Requests to run with the authority of the task must receive the proper approval.
- Submitting requests is controlled by RACF. The ability to approve, view, and deny those requests is also controlled by RACF.
- Users can enter requests that are beyond their ‘regular’ RACF authority to run under the tasks authority which can be approved or denied by an administrator. This allows the administrator to decentralize functions without giving the user the actual authority that might have been necessary to perform the request.
- The Scheduler submits any form of JCL or TSO command, therefore, you can schedule non-RACF related events as well.
|Full Security Server Field Support||SSA supports all features, fields and segments in Security Server. Features like command generation, online generic searches and any other means of reporting or information accessing that is relevant fully support Security Server.|
|Security Server Information Offload Job||SSA’s offload method can utilize the IRRDBU00 utility or its own AADBU00 which offloads your live Security Server database and creates the same file format for loading. All offloading has security checking built-in allowing the administrator to create custom offload jobs for end users.|
|ISPF Tables Only||All Security Server Information Storage is ISPF based. This allows SSA to be easily upgraded and enhanced. This ensures that all new fields and information required to remain compatible with future releases of Security Server can be added easily and quickly.|
|Batch or Online||The power of generic searching can be utilized to generate reports in batch or online mode. The batch JCL interface is identical to other reporting features.|
|Extended or Standard Searching||Generic searches use standard ISPF searching (left to right masking) or SSA's extended searching which allows you to search by individual characters or strings within strings.|
|Adhoc Report Generation||Batch processing can utilize a report mask (or you can use the default set report format) enabling you to dictate exactly how the report format should turn out. Now, if none of the standard report layouts meet your needs, you can design your own.|
|Adhoc Command Generation in Batch||Utilizing the substitution power of adhoc report generation, the tremendous versatility and power of adhoc command generation can now be done in batch.|
|Select and Scroll||SSA allows you to select as many table displayed entries as you wish. All selections will be handled by each mode (Various, Adhoc, Print, and Sort) and those selections can either be purged or kept at your discretion.|
|Sort by Multiple Fields/Orders||All online generic search displays can be sorted by up to 8 fields each with its own order.|
|Expanded Search Fields||All online generic searches include all new Security Server fields. The variety of searches possible is tremendous.
Various Mode Options:
• SSA or Security Server List functions
• Display subsequent information like permits on a particular profile
• Pass to other functions like Command Generation or Password Administration
• Issue command to either rebuild an entry or create the entry for another user or group
• Edit Installation and Application data on all relevant profiles
|Long and Short Displays||The generic search result displays have a short or long display option. If the user wishes to see more or less of the table fields displayed, it’s their choice.|
|Schedule Generated Commands||
As with all other functions, any generated commands can be sent to the SCHEDULER.