ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvifsrootfiles.htm

124 lines
7.4 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Root, QOpenSys, and user-defined file systems" />
<meta name="abstract" content="These are security considerations for the root, QOpenSys, and user-defined file systems." />
<meta name="description" content="These are security considerations for the root, QOpenSys, and user-defined file systems." />
<meta name="DC.Relation" scheme="URI" content="rzamvplanifssec.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvifssecrootfile.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvifsrootdir.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="ifsrootfiles" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Root, QOpenSys, and user-defined file systems</title>
</head>
<body id="ifsrootfiles"><a name="ifsrootfiles"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Root, QOpenSys, and user-defined file systems</h1>
<div><p>These are security considerations for the root, QOpenSys, and user-defined
file systems.</p>
<div class="section"><h4 class="sectiontitle">How authority works</h4><div class="p">The root, QOpenSys, and user-defined
file systems provide a blending of iSeries™ server, PC, and UNIX** capabilities
both for object management and for security. When you use the integrated file
system commands from an iSeries server session (WRKAUT and CHGAUT), you can
set all the normal iSeries server object authorities. This includes
the *R, *W, and *X authorities that are compatible with Spec 1170 (UNIX-type
operating systems).<div class="note"><span class="notetitle">Note:</span> The root, QOpenSys, and user-defined file systems
are functionally equivalent. The QOpenSys file system is case-sensitive. The
root file system is not. User-defined file systems can be defined as case-sensitive.
Because these file systems have the same security characteristics, you can
assume in the topics that follow that their names are used interchangeably.</div>
When
you access the root file system as an administrator from a PC session, you
can set object attributes that the PC uses to restrict certain types of access:<ul><li>System</li>
<li>Hidden</li>
<li>Archive</li>
<li>Read-only</li>
</ul>
These PC attributes are in addition to, not replacements for, iSeries server
object authority values.</div>
<p>When a user attempts to access an object in
the root file system, OS/400<sup>®</sup> enforces all of the object authority values
and attributes for the object, whether or not those authorities are ″visible″
from the users interface. For example, assume that the read-only attribute
for an object is set on. A PC user cannot delete the object through a iSeries Access
interface. An iSeries server
user with a fixed function workstation cannot delete the object either, even
if the iSeries server
user has *ALLOBJ special authority. Before the object can be deleted, an authorized
user must use a PC function to reset the read-only value to off. Similarly,
a PC user might not have sufficient OS/400 authority to change the PC-relevant
security attributes of an object.</p>
<div class="p">UNIX-type applications that run on iSeries servers
use UNIX-like application programming interfaces (APIs) to access data in
the root file system. With UNIX-like APIs, applications can recognize and
maintain the following security information:<ul><li>Object owner</li>
<li>Group owner (iSeries server
primary group authority)</li>
<li>Read (files)</li>
<li>Write (change contents)</li>
<li>Execute (run programs or search directories)</li>
<li>S_ISVTX mode bit (restricted rename and unlink attribute)</li>
</ul>
The system maps these data authorities to existing iSeries server
object and data authorities:<ul><li>Read (*R) = *OBJOPR and *READ</li>
<li>Write (*W) = *OBJOPR, *ADD, *UPD, *DLT</li>
<li>Execute (*X) = *OBJOPR and *EXECUTE</li>
</ul>
The concepts for other object authorities (*OBJMGT, *OBJEXIST, *OBJALTER,
and *OBJREF) do not exist in a UNIX-type environment.</div>
<div class="p">However, these
object authorities do exist for all of the objects in the root file system.
When you create an object using a UNIX-like API, that object inherits these
authorities from the parent directory, resulting in the following:<ul><li>The new objects owner has the same object authority as the parent directorys
owner.</li>
<li>The new objects primary group has the same object authority as the parent
directorys primary group.</li>
<li>The new objects public has the same object authority as the parent directorys
public.</li>
</ul>
The new objects data authority for owner, primary group, and public
are specified on the API with the mode parameter. When all of the object authorities
are set on, you get the authority behavior that you would expect in a UNIX-type
environment. It is best to leave them set on, unless you do not want the
POSIX-like behavior. </div>
<p>When you run applications that use UNIX-like APIs,
the system enforces all object authorities, whether or not they are ″visible″
to UNIX-type applications. For example, the system will enforce the authority
of authorization lists even though the concept of authorization lists does
not exist in UNIX-type operating systems. </p>
<p>When you have a mixed-application
environment, you need to ensure that you do not make authority changes in
one environment that will break your applications in another environment.</p>
</div>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="rzamvifssecrootfile.htm">Security commands for the root, QOpenSys, and user-defined file systems</a></strong><br />
IBM provides a set of commands for working with objects in multiple file systems.</li>
<li class="ulchildlink"><strong><a href="rzamvifsrootdir.htm">Public authority to the root directory</a></strong><br />
When your system ships, the public authority to the <span class="q">"root"</span> directory
is *ALL (all object authorities and all data authorities).</li>
</ul>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvplanifssec.htm" title="The integrated file system provides you with multiple ways to store and view information on the server.">Plan integrated file system security</a></div>
</div>
</div>
</body>
</html>