External Security Managers

On z/OS, IBM MQ does not own the master list of who may access corporate resources. That role belongs to the external security manager (ESM)—the product installed system-wide to answer SAF authorization requests. IBM RACF is the default choice in many IBM-centric enterprises; Broadcom Top Secret and CA ACF2 serve the same role at other sites. MQ administrators who know setmqaut on Linux must partner with ESM teams on mainframe: you supply queue manager names, queue names, channel identities, and required access; they implement profiles, audit options, and emergency revocation. This tutorial compares the three major ESMs in relation to MQ, explains the SAF boundary, documents operational handoffs, covers hybrid environments where distributed OAM and z/OS ESM both apply, and gives beginners vocabulary for security meetings without claiming vendor-specific syntax that varies by release and site standards.

SAF and the ESM Boundary

Every ESM integrates through SAF. MQ is unaware of whether RACF or ACF2 answered—the call is “authorize this user on this class/profile/access.” That abstraction lets enterprises switch or coexist with migration programs (rare but documented in large mergers). MQ documentation lists resource classes and profile conventions; ESM documentation lists how to create and audit those profiles. Your job on the MQ side is accurate resource naming and least privilege requirements, not writing RACF rules without security team review.

Major z/OS ESMs and MQ relationship
ESMVendorMQ administrator note
RACFIBMMost IBM MQ z/OS examples; SMF audit integration familiar to operations
Top SecretBroadcomUse Top Secret admin guides with IBM MQ class names
ACF2Broadcom (CA)ACF2 rules and reporting differ; same SAF entry from MQ
OAM (distributed)IBM MQNot an ESM—used on Linux/Windows queue managers instead of RACF

IBM RACF and MQ

RACF stores profiles in classes such as those defined in IBM MQ for z/OS security manuals (MQQUEUE, MQCONN, and others per release). Commands like RDEFINE, PERMIT, and SETROPTS RACLIST are security team tools. MQ defines which operations require which access levels. Integration testing uses real user IDs and started tasks, not the MQ administrator’s personal ID alone. RACF also controls who may issue superuser MQ commands—separate from application put and get. See the RACF integration tutorial in this series for profile-oriented detail.

CA ACF2 and MQ

ACF2 sites implement access rules and INFOTYPE records according to ACF2 methodology. MQ still calls SAF; ACF2 enforces. Naming conventions may differ from RACF examples in IBM redbooks—translate IBM’s RACF-oriented profile names to ACF2 equivalents with your security architect. Audit trails use ACF2 reporting. Hybrid project teams must not paste RACF JCL from the internet into ACF2 systems without conversion.

Broadcom Top Secret and MQ

Top Secret uses its resource and facility model. MQ resource classes appear in Top Secret administration with vendor documentation mapping IBM MQ access to Top Secret privileges. As with ACF2, the MQ object model is unchanged—only administration syntax differs. Training materials for new MQ hires should state which ESM the site runs to avoid confusion in classrooms that default to RACF slides.

Explainer: One Guard Book for the Whole Building

The external security manager is the single guard rulebook for the mainframe building. IBM MQ rooms (queues) have entries in that book. CICS and Db2 use the same book, so one fired employee badge stops everything at once.

Hybrid: Distributed OAM Plus z/OS ESM

Modern architectures connect Linux queue managers to z/OS queue managers with channels. Linux side uses setmqaut on queues and CHLAUTH for connections. z/OS side uses ESM profiles for the MCAUSER or mapped user that arrives on the channel. End-to-end security reviews must list both sides. A fully authorized Linux service ID is useless if the z/OS ID mapped at the channel lacks RACF UPDATE on the target queue. Conversely, perfect RACF profiles fail if the Linux client cannot connect or lacks put authority on the remote queue definition path.

text
1
2
3
4
Distributed QM_Linux --[channel TLS]--> z/OS QM_MAIN Linux: setmqaut -p APPUSER +put on REMOTE.Q z/OS: RACF PERMIT on profile for APPUSER (or mapped MCAUSER) on queue resolved on QM_MAIN

Operational Handoffs

  1. MQ team publishes object naming standard and access matrix (put/get/browse/admin).
  2. ESM team implements profiles and documents audit settings.
  3. Application team supplies service user IDs and environment (CICS, batch, IMS).
  4. Change management ties RACF changes to MQ object promotions.
  5. Periodic recertification of MQ profiles by data owners.

Choosing and Migrating ESM (Enterprise Context)

Greenfield z/OS today still picks an ESM at the platform level, not per MQ. MQ follows that decision. Mergers that consolidate ESMs require massive profile migration projects—MQ is one consumer among hundreds. Plan MQ regression tests for 2035 rates, channel starts, and CSQ admin commands after ESM migration milestones.

Audit and Compliance

Regulators ask who can read production payment queues. ESM reports answer for z/OS; dspmqaut and AUTHREC reports answer for distributed. Architecture diagrams for hybrid flows should show both. SOS and break-glass IDs require extra monitoring on ESM audit trails.

Troubleshooting Across ESM Boundaries

  • Confirm which ESM is active on the LPAR (not assumed from training slides).
  • Use ESM-native list commands, not RACF-only examples from blogs, on ACF2/Top Secret sites.
  • Verify group membership in the ESM that actually serves SAF.
  • Check for duplicate or conflicting rules when mergers left legacy profiles.

Explain Like I'm Five: External Security Managers

The external security manager is the one boss who keeps the list of who may enter every room; IBM MQ asks that boss before opening a door.

Practice Exercises

Exercise 1

Create an access matrix template with columns for object, Linux setmqaut, and z/OS ESM profile.

Exercise 2

Describe a channel from Linux to z/OS and list security owners for each hop.

Exercise 3

Explain why teaching only RACF syntax fails at an ACF2 shop.

Frequently Asked Questions

Frequently Asked Questions

Test Your Knowledge

Test Your Knowledge

1. ESM examples include:

  • RACF, ACF2, Top Secret
  • Kafka, RabbitMQ
  • Git, Jenkins
  • FTP only

2. MQ on z/OS authorizes via:

  • SAF to ESM
  • Only mqclient.ini
  • CCDT alone
  • No checks

3. setmqaut is primarily for:

  • Distributed OAM
  • z/OS RACF
  • CICS BMS
  • JES

4. ESM admin owns:

  • Profile definitions and audit policy
  • TCP cipher suites only
  • Message payload format
  • COBOL compile options
Published
Read time21 min
AuthorMainframeMaster
Verified: IBM MQ for z/OS security documentation