Use alias queues to distinguish between MQGET and MQPUT requests
The range of MQI calls available in one access level can cause a problem if we want to restrict access to a queue to allow only the MQPUT call or only the MQGET call. A queue can be protected by defining two aliases that resolve to that queue: one that enables applications to get messages from the queue, and one that enable applications to put messages on the queue.
The following text gives you an example of how we can define your queues to IBM MQ :DEFINE QLOCAL(MUST_USE_ALIAS_TO_ACCESS) GET(ENABLED) PUT(ENABLED) DEFINE QALIAS(USE_THIS_ONE_FOR_GETS) GET(ENABLED) PUT(DISABLED) TARGQ(MUST_USE_ALIAS_TO_ACCESS) DEFINE QALIAS(USE_THIS_ONE_FOR_PUTS) GET(DISABLED) PUT(ENABLED) TARGQ(MUST_USE_ALIAS_TO_ACCESS)We must also make the following RACF definitions:
RDEFINE MQQUEUE hlq.MUST_USE_ALIAS_TO_ACCESS UACC(NONE) RDEFINE MQQUEUE hlq.USE_THIS_ONE_FOR_GETS UACC(NONE) RDEFINE MQQUEUE hlq.USE_THIS_ONE_FOR_PUTS UACC(NONE)Then you ensure that no users have access to the queue hlq.MUST_USE_ALIAS_TO_ACCESS, and give the appropriate users or groups access to the alias. We can do this using the following RACF commands:
PERMIT hlq.USE_THIS_ONE_FOR_GETS CLASS(MQQUEUE) ID(GETUSER,GETGRP) ACCESS(UPDATE) PERMIT hlq.USE_THIS_ONE_FOR_PUTS CLASS(MQQUEUE) ID(PUTUSER,PUTGRP) ACCESS(UPDATE)
This means user ID GETUSER and user IDs in the group GETGRP are only allowed to get messages on MUST_USE_ALIAS_TO_ACCESS through the alias queue USE_THIS_ONE_FOR_GETS; and user ID PUTUSER and user IDs in the group PUTGRP are only allowed to put messages through the alias queue USE_THIS_ONE_FOR_PUTS.
Note:- To use a technique like this, we must inform the application developers, so that they can design their programs appropriately.
- We can use a technique like this for the destination queue you provide on and MQSUB API request if we want to distinguish between the users making the subscriptions and the users 'getting' the publications from the destination queue.
Parent topic: Profiles for queue security