Establishing secure communications with the Distributed Data Server
You must ensure that communication between the Resource Monitoring tasks and the RMF Distributed Data
Server (DDS) is protected. For secure network communications, it is recommended that you use
Application Transparent Transport Layer Security (AT-TLS) and Transport Layer Security (TLS), as
described in this topic.
Ensure that the basic certificate setup is done. For information about handling certificates for
secure communications with RACF, see the topic on digital certificates in z/OS Security Server RACF Security Administrator's Guide.
To enable AT-TLS and encrypted communication with the DDS server, you require the following:
Valid server certificate and the associated server private key
Certificate from a trusted Certificate Authority (CA).
The example in Figure 1
uses a key ring that is named DDSServerKeyring to store these credentials. This key
ring must be accessible by the DDS server user ID (for example, GPMSERVE), and the server
certificate must be the default certificate.
To enable secure communication for the Resource Monitoring tasks, you require a certificate
from a trusted Certificate Authority (CA). The example in Figure 2 uses a key ring that is
named DDSClientKeyring to store the credentials. This key ring must be accessible
to the z/OSMF server user ID, which is IZUSVR, by default.
Configure the Policy Agent to specify secure communication for the DDS server.
For a sample policy, see Figure 1.Figure 1. Sample Policy Agent policy for simple SSL protection for the RMF DDS server
#-------------------------------------------------#
# TYQ: Created this file for the pagent #
# configuration for the GPMSERVE server. #
#-------------------------------------------------#
# RMF DDS SERVER RULE
TTLSRule DDSServerRule
{
LocalPortRange 8803
Jobname GPMSERVE
Direction Inbound
TTLSGroupActionRef DDSServerGRP
TTLSEnvironmentActionRef DDSServerENV
}
TTLSGroupAction DDSServerGRP
{
TTLSEnabled On
Trace 255
}
TTLSEnvironmentAction DDSServerENV
{
HandshakeRole Server
TTLSKeyringParms
{
Keyring DDSServerKeyring
}
}
Where the AT-TLS policy properties are set, as follows:
TTLSRule: Jobname
Identifies the program for which this rule applies, which is the RMF DDS server in this example
(GPMSERVE). If you set the property as shown, the policy affects GPMSERVE only; it
does not affect other programs that are running on the system.
TTLSRule: LocalPortRange
Specifies the port of the RMF DDS server, which is 8803 in the example.
TTLSRule: Direction
Specifies the direction from which a connection must be initiated for this rule's action to be
performed. In the example, Inbound is specified, which means that the rule applies
to connection requests that arrive inbound to the local host. An application must issue an accept
request to service this connection.
TTLSKeyringParms: Keyring
Specifies the key ring name of the RMF DDS server, which is DDSServerKeyring in
the example. The key ring must contain the server certificate, the associated server private key,
and the certificate of the trusted Certificate Authority (CA).
Configure the Policy Agent to require secure communication for the Resource Monitoring tasks.
For an example of a Policy Agent policy for setting up simple TLS protection for the Resource Monitoring tasks, see Figure 2.Figure 2. Sample Policy Agent policy for simple TLS protection for the Resource Monitoring tasks
Where the AT-TLS policy properties are set, as follows:
TTLSRule: RemoteAddr
Specifies the remote IP address for which this rule's action is to be performed. In the example,
it is the IP address of the remote RMF DDS server (9.xxx.yyy.zzz).
TTLSRule: RemotePortRange
Specifies the port of the remote RMF DDS server, which is 8803 in the
example.
TTLSRule: Direction
Specifies the direction from which a connection must be initiated for this rule's action to be
performed. In the example, Outbound is specified, which means that the rule applies
to connection requests that are issued from the local host. An application must issue a connect
request to initiate a connection.
TTLSKeyringParms: Keyring
Specifies the key ring name of the z/OSMF server, which is DDSClientKeyring in
the example. The key ring must contain the certificate of the trusted Certificate Authority (CA)
that issued the server certificate.
Refresh the Policy Agent to have your changes take effect.
You can use the following command to refresh the Policy Agent: