Clustered Topic Security

Clustered topic security extends single-queue-manager pub/sub ACL design to every member that participates in IBM MQ cluster pub/sub. TOPTYPE(CLUS) topics publish routing information to full and partial repositories; SUBSCOPE(ALL) subscriptions advertise interest across the cluster; publications may traverse CLUSSDR and CLUSRCVR channels to remote destination queues. A gap on one member—missing +sub for the analytics service on QM_DUBLIN while London is correct—looks like an application bug but is a security configuration defect. This tutorial explains consistent ACL rollout across cluster members, protecting cluster channels, repository reconnaissance risk, data residency with SUBSCOPE, separating publisher-only and subscriber-only sites, auditing DISPLAY CLUSQMGR and SUB on each node, and incident response when a compromised member could publish cluster-wide events.

Security Surfaces in Cluster Pub/Sub

Cluster pub/sub security surfaces
SurfaceWhat is protectedPrimary control
Topic ACL per QMPUB and SUB on branchessetmqaut replicated per member
DEST queue ACLMessage copies at each site+get per local consumer ID
Cluster channelsWire metadata and messagesTLS, CHLAUTH, peer QMGR names
CLUS topic adminRouting definitionsRestrict +crt/+chg on TOPIC
RepositoryTopology visibilityLimit cluster membership

Consistent ACL Rollout Pattern

Maintain one Git repository of setmqaut scripts parameterized by queue manager name. For role MQ.RETAIL.CONSUMER, grant identical +sub on prod/retail/# on QM_LON, QM_PAR, QM_NYC. Drift detection: nightly job runs dspmqaut on all members and diffs output. New cluster members receive full ACL baseline before joining production cluster. Never clone a queue manager object set without cloning topic ACLs.

shell
1
2
3
4
5
6
7
* On each member QM_LON, QM_PAR, QM_NYC - same logical grants setmqaut -m QM_LON -t topic -n 'prod/events/#' -p MQ.EVENTS.PUB +pub setmqaut -m QM_LON -t topic -n 'prod/events/#' -p MQ.EVENTS.SUB +sub setmqaut -m QM_PAR -t topic -n 'prod/events/#' -p MQ.EVENTS.PUB +pub setmqaut -m QM_PAR -t topic -n 'prod/events/#' -p MQ.EVENTS.SUB +sub DEFINE TOPIC('PROD.EVENTS.CLUS') TOPSTR('prod/events') TOPTYPE(CLUS) + CLUSTER('CORP') PUBSCOPE(ALL) SUBSCOPE(ALL)

Publisher-Only and Subscriber-Only Sites

Some data centers publish but must not subscribe to foreign events—grant PUB without SUB on sensitive outbound sites. Conversely DR sites may subscribe without publish. Document matrix per queue manager: PUB allowed branches, SUB allowed branches, DEST queue prefixes permitted. Prevents a compromised publisher-only site from registering shadow subs if SUB is denied cluster-wide on that QM.

Data Residency and SUBSCOPE

Regulations may forbid subscription interest leaving a region. Use SUBSCOPE(QMGR) on EU queue managers even when cluster topics use PUBSCOPE(ALL)—understand IBM routing outcomes for your release; test that publications do not copy to forbidden DEST. Architectural alternative: separate clusters per jurisdiction with controlled bridge queue managers.

Compromised Cluster Member

  1. Remove queue manager from cluster or stop cluster channels.
  2. Revoke PUB and SUB for service IDs on that node.
  3. DISPLAY SUB on all members for DEST pointing to compromised host.
  4. Rotate certificates and MCAUSER passwords used on cluster channels.
  5. Review SMF or MQ error logs for unexpected publish rates.

Explainer: Security at Every Train Station

Cluster pub/sub is a train line with multiple stations. Each station needs its own ticket check (ACL) for who may send packages (PUB) and who may receive copies (SUB). Securing only the first station does not protect the last.

Explain Like I'm Five: Clustered Topic Security

When many schools share one announcement system, every school needs the same rules about who may talk and who may listen—not just your school.

Practice Exercises

Exercise 1

Design ACL matrix for three QMs: pub-only, sub-only, both.

Exercise 2

Why diff dspmqaut across cluster members weekly?

Exercise 3

List five steps if a cluster member is compromised.

Frequently Asked Questions

Frequently Asked Questions

Test Your Knowledge

Test Your Knowledge

1. Clustered topic security requires ACLs on:

  • Each cluster member QM
  • Only one QM
  • Only FTP
  • Only DLQ

2. Repository stores:

  • Routing metadata not payloads
  • All message bodies
  • Passwords
  • JCL

3. SUBSCOPE ALL increases:

  • Subscription visibility across QMs
  • MAXMSGL only
  • Page set
  • COBOL sequence

4. Cluster channels need:

  • TLS and CHLAUTH
  • No security
  • Only pub
  • Only FTP
Published
Read time18 min
AuthorMainframeMaster
Verified: IBM MQ 9.3 documentation