124 lines
7.4 KiB
HTML
124 lines
7.4 KiB
HTML
<?xml version="1.0" encoding="UTF-8"?>
|
||
<!DOCTYPE html
|
||
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||
<html lang="en-us" xml:lang="en-us">
|
||
<head>
|
||
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
||
<meta name="security" content="public" />
|
||
<meta name="Robots" content="index,follow" />
|
||
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
||
<meta name="DC.Type" content="concept" />
|
||
<meta name="DC.Title" content="Root, QOpenSys, and user-defined file systems" />
|
||
<meta name="abstract" content="These are security considerations for the root, QOpenSys, and user-defined file systems." />
|
||
<meta name="description" content="These are security considerations for the root, QOpenSys, and user-defined file systems." />
|
||
<meta name="DC.Relation" scheme="URI" content="rzamvplanifssec.htm" />
|
||
<meta name="DC.Relation" scheme="URI" content="rzamvifssecrootfile.htm" />
|
||
<meta name="DC.Relation" scheme="URI" content="rzamvifsrootdir.htm" />
|
||
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
||
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
||
<meta name="DC.Format" content="XHTML" />
|
||
<meta name="DC.Identifier" content="ifsrootfiles" />
|
||
<meta name="DC.Language" content="en-us" />
|
||
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
<!-- US Government Users Restricted Rights -->
|
||
<!-- Use, duplication or disclosure restricted by -->
|
||
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
||
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
||
<title>Root, QOpenSys, and user-defined file systems</title>
|
||
</head>
|
||
<body id="ifsrootfiles"><a name="ifsrootfiles"><!-- --></a>
|
||
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
||
<h1 class="topictitle1">Root, QOpenSys, and user-defined file systems</h1>
|
||
<div><p>These are security considerations for the root, QOpenSys, and user-defined
|
||
file systems.</p>
|
||
<div class="section"><h4 class="sectiontitle">How authority works</h4><div class="p">The root, QOpenSys, and user-defined
|
||
file systems provide a blending of iSeries™ server, PC, and UNIX** capabilities
|
||
both for object management and for security. When you use the integrated file
|
||
system commands from an iSeries server session (WRKAUT and CHGAUT), you can
|
||
set all the normal iSeries server object authorities. This includes
|
||
the *R, *W, and *X authorities that are compatible with Spec 1170 (UNIX-type
|
||
operating systems).<div class="note"><span class="notetitle">Note:</span> The root, QOpenSys, and user-defined file systems
|
||
are functionally equivalent. The QOpenSys file system is case-sensitive. The
|
||
root file system is not. User-defined file systems can be defined as case-sensitive.
|
||
Because these file systems have the same security characteristics, you can
|
||
assume in the topics that follow that their names are used interchangeably.</div>
|
||
When
|
||
you access the root file system as an administrator from a PC session, you
|
||
can set object attributes that the PC uses to restrict certain types of access:<ul><li>System</li>
|
||
<li>Hidden</li>
|
||
<li>Archive</li>
|
||
<li>Read-only</li>
|
||
</ul>
|
||
These PC attributes are in addition to, not replacements for, iSeries server
|
||
object authority values.</div>
|
||
<p>When a user attempts to access an object in
|
||
the root file system, OS/400<sup>®</sup> enforces all of the object authority values
|
||
and attributes for the object, whether or not those authorities are ″visible″
|
||
from the user’s interface. For example, assume that the read-only attribute
|
||
for an object is set on. A PC user cannot delete the object through a iSeries Access
|
||
interface. An iSeries server
|
||
user with a fixed function workstation cannot delete the object either, even
|
||
if the iSeries server
|
||
user has *ALLOBJ special authority. Before the object can be deleted, an authorized
|
||
user must use a PC function to reset the read-only value to off. Similarly,
|
||
a PC user might not have sufficient OS/400 authority to change the PC-relevant
|
||
security attributes of an object.</p>
|
||
<div class="p">UNIX-type applications that run on iSeries servers
|
||
use UNIX-like application programming interfaces (APIs) to access data in
|
||
the root file system. With UNIX-like APIs, applications can recognize and
|
||
maintain the following security information:<ul><li>Object owner</li>
|
||
<li>Group owner (iSeries server
|
||
primary group authority)</li>
|
||
<li>Read (files)</li>
|
||
<li>Write (change contents)</li>
|
||
<li>Execute (run programs or search directories)</li>
|
||
<li>S_ISVTX mode bit (restricted rename and unlink attribute)</li>
|
||
</ul>
|
||
The system maps these data authorities to existing iSeries server
|
||
object and data authorities:<ul><li>Read (*R) = *OBJOPR and *READ</li>
|
||
<li>Write (*W) = *OBJOPR, *ADD, *UPD, *DLT</li>
|
||
<li>Execute (*X) = *OBJOPR and *EXECUTE</li>
|
||
</ul>
|
||
The concepts for other object authorities (*OBJMGT, *OBJEXIST, *OBJALTER,
|
||
and *OBJREF) do not exist in a UNIX-type environment.</div>
|
||
<div class="p">However, these
|
||
object authorities do exist for all of the objects in the root file system.
|
||
When you create an object using a UNIX-like API, that object inherits these
|
||
authorities from the parent directory, resulting in the following:<ul><li>The new object’s owner has the same object authority as the parent directory’s
|
||
owner.</li>
|
||
<li>The new object’s primary group has the same object authority as the parent
|
||
directory’s primary group.</li>
|
||
<li>The new object’s public has the same object authority as the parent directory’s
|
||
public.</li>
|
||
</ul>
|
||
The new object’s data authority for owner, primary group, and public
|
||
are specified on the API with the mode parameter. When all of the object authorities
|
||
are set ’on’, you get the authority behavior that you would expect in a UNIX-type
|
||
environment. It is best to leave them set ’on’, unless you do not want the
|
||
POSIX-like behavior. </div>
|
||
<p>When you run applications that use UNIX-like APIs,
|
||
the system enforces all object authorities, whether or not they are ″visible″
|
||
to UNIX-type applications. For example, the system will enforce the authority
|
||
of authorization lists even though the concept of authorization lists does
|
||
not exist in UNIX-type operating systems. </p>
|
||
<p>When you have a mixed-application
|
||
environment, you need to ensure that you do not make authority changes in
|
||
one environment that will break your applications in another environment.</p>
|
||
</div>
|
||
</div>
|
||
<div>
|
||
<ul class="ullinks">
|
||
<li class="ulchildlink"><strong><a href="rzamvifssecrootfile.htm">Security commands for the root, QOpenSys, and user-defined file systems</a></strong><br />
|
||
IBM provides a set of commands for working with objects in multiple file systems.</li>
|
||
<li class="ulchildlink"><strong><a href="rzamvifsrootdir.htm">Public authority to the root directory</a></strong><br />
|
||
When your system ships, the public authority to the <span class="q">"root"</span> directory
|
||
is *ALL (all object authorities and all data authorities).</li>
|
||
</ul>
|
||
|
||
<div class="familylinks">
|
||
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvplanifssec.htm" title="The integrated file system provides you with multiple ways to store and view information on the server.">Plan integrated file system security</a></div>
|
||
</div>
|
||
</div>
|
||
</body>
|
||
</html> |