One of a firm’s most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it.
The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm’s data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware.
This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment.
This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.
Chapter 1. z/VSE and security
Chapter 2. z/VSE Basic Security Manager
Chapter 3. LDAP sign-on support
Chapter 4. Cryptography on z/VSE
Chapter 5. Secure Sockets Layer with z/VSE
Chapter 6. CICS Web Support security
Chapter 7. Connector security
Chapter 8. TCP/IP security
Chapter 9. Secure Telnet
Chapter 10. Secure File Transfer Protocol
Chapter 11. WebSphere MQ with SSL
Appendix A. Security APIs
Appendix B. Setting up and using Keyman/VSE