Auditing RESLEVEL
We can decide whether to produce RESLEVEL audit records by setting the RESAUDIT system parameter to YES or NO. If the RESAUDIT parameter is set to NO, audit records are not produced. For more details about setting this parameter, see Using CSQ6SYSP.
If RESAUDIT is set to YES, no normal RACF audit records are taken when the RESLEVEL check is made to see what access an address space user ID has to the hlq.RESLEVEL profile. Instead, WebSphere MQ requests that RACF create a GENERAL audit record (event number 27). These checks are only carried out at connect time, so the overhead should be minimal.
We can report the WebSphere MQ general audit records using the RACF report writer (RACFRW). You could use the following RACFRW commands to report the RESLEVEL access:
RACFRW SELECT PROCESS EVENT GENERAL LIST ENDA sample report from RACFRW, excluding the Date, Time, and SYSID fields, is shown in Figure 31.
Figure 31. Sample output from RACFRW showing RESLEVEL general audit recordsRACF REPORT - LISTING OF PROCESS RECORDS PAGE 4 E V Q E U *JOB/USER *STEP/ --TERMINAL-- N A NAME GROUP ID LVL T L WS21B MQMGRP IGJZM000 0 27 0 JOBID=(WS21B 05.111 09:44:57),USERDATA=() TRUSTED USER AUTH=(NONE),REASON=(NONE) SESSION=TSOLOGON,TERMINAL=IGJZM000, LOGSTR='CSQH RESLEVEL CHECK PERFORMED AGAINST PROFILE(QM66.RESLEVEL), CLASS(MQADMIN), ACCESS EQUATES TO (CONTROL)',RESULT=SUCCESS,MQADMINFrom checking the LOGSTR data in the output above, we can see that TSO user WS21B has CONTROL access to QM66.RESLEVEL. This means that all resource security checks are bypassed when user WS21B access QM66 resources.
For more information about using RACFRW, see the z/OS Security Server RACF Auditor's Guide.