IDPWOS

IDPWOS—identity password operating system repository—is the IBM MQ AUTHINFO type that stores connection passwords in a queue-manager-local repository maintained by MQ tooling rather than in your corporate LDAP. When ALTER QMGR CONNAUTH points at an AUTHINFO defined with AUTHTYPE(IDPWOS), client applications must present a userid and password that the queue manager validates against that repository before MQOPEN succeeds. IDPWOS is ideal for training labs, proof-of-concept queue managers, disaster-recovery fallback when directory services are unavailable, and small integrations with a handful of service accounts. It is a poor primary store for thousands of human passwords that already live in Active Directory. This tutorial explains DEFINE AUTHINFO IDPWOS, pairing with CONNAUTH, adding and removing users per platform procedures, password policy limitations compared to LDAP, CHCKCLNT interaction, migrating from IDPWOS to LDAP, security cautions about file permissions on the repository, and troubleshooting “invalid userid/password” when OAM grants were never the problem.

How IDPWOS Fits CONNAUTH

The flow is linear: client MQCONNX with optional security credentials, queue manager reads CONNAUTH name, loads AUTHINFO IDPWOS definition, compares presented password to stored hash or secret in the repository, returns success or connection error. No LDAP network hop occurs—latency is low but operational burden of password rotation falls on MQ administrators unless scripted. After success, ADOPTCTX and CHLAUTH determine the OAM principal.

IDPWOS versus IDPWLDAP
AspectIDPWOSIDPWLDAP
Credential storeMQ OS repository fileCorporate LDAP
ScaleSmall user countEnterprise directories
Password policyMQ admin disciplineDirectory lockout/expiry
Network dependencyNone for authLDAP reachability
Typical useLab, DR fallbackProduction clients

Defining IDPWOS AUTHINFO

shell
1
2
3
4
5
DEFINE AUTHINFO('QM1.IDPWOS') AUTHTYPE(IDPWOS) + DESCR('Local password repository for lab') ALTER QMGR CONNAUTH(QM1.IDPWOS) DISPLAY AUTHINFO('QM1.IDPWOS') ALL DISPLAY QMGR CONNAUTH

DESCR is documentation only. No LDAP CONNAME appears on IDPWOS objects. After ALTER QMGR, existing connections may continue until disconnect; new connections use IDPWOS. Add users using IBM's platform-specific password command before testing—empty repository rejects all logins.

User Administration

On Linux distributed MQ, administrators traditionally use the mqpasswd utility or successor documented for the release to add, change, and delete users in the repository. Windows has parallel tooling. Procedures differ from setmqaut: password commands manage authentication identity; setmqaut manages authorization after identity is known. Document which team owns each. Rotating a password requires updating both client configuration and repository entry—missing the client side looks like intermittent failure after successful admin update.

Security Hardening for IDPWOS

  • Restrict file system permissions on repository files to mqm group only.
  • Do not reuse production passwords in lab repositories copied to laptops.
  • Disable IDPWOS CONNAUTH on production when LDAP is primary—keep break-glass procedure only.
  • Audit repository user list quarterly; remove leavers immediately.
  • Combine with TLS on SVRCONN so passwords are not sent cleartext over networks.

Common Errors

MQRC_NOT_AUTHORIZED at connect with authentication comments in AMQ logs often means wrong password or unknown user in IDPWOS—not missing +put. MQRC_Q_MGR_NOT_AVAILABLE is different—queue manager down. Client API must pass security connection fields—Java and .NET have explicit flags; missing flag sends no password while server expects one. Channel MCAUSER does not substitute for client password on SVRCONN when CONNAUTH requires it.

Explainer: Guest List in a Notebook

IDPWOS is a notebook at the door listing allowed names and secret handshakes. LDAP is calling headquarters to verify every visitor. The notebook is fast for a small club but impossible for a stadium.

Explain Like I'm Five: IDPWOS

IDPWOS is when the treehouse guard keeps their own list of secret passwords in a notebook instead of calling parents to check.

Practice Exercises

Exercise 1

Write MQSC to create IDPWOS AUTHINFO and enable CONNAUTH.

Exercise 2

When would you keep IDPWOS as DR fallback while LDAP is primary?

Exercise 3

Connect fails—prove whether failure is IDPWOS or OAM in three steps.

Frequently Asked Questions

Frequently Asked Questions

Test Your Knowledge

Test Your Knowledge

1. IDPWOS AUTHTYPE means:

  • OS password repository
  • LDAP only
  • No passwords
  • Channel sequence

2. IDPWOS is activated via:

  • CONNAUTH pointing to AUTHINFO
  • DEFINE QLOCAL only
  • START LISTENER only
  • CLUSTER attr

3. Enterprise scale often prefers:

  • LDAP or certificates
  • IDPWOS only always
  • No CONNAUTH
  • Anonymous all

4. Lab use case for IDPWOS:

  • Quick password auth testing
  • Production 10k users
  • Bypass OAM
  • Disable TLS
Published
Read time15 min
AuthorMainframeMaster
Verified: IBM MQ 9.3 documentation