Password Protection

Password protection in IBM MQ is the set of controls that keep credentials confidential while they are stored, transmitted, and administered—not the same question as whether a password is valid, which is authentication. A queue manager might authenticate correctly yet expose LDAPPWD in a careless DISPLAY AUTHINFO screenshot, or store IDPWOS backups on an unencrypted tape. Regulators and internal auditors ask how passwords are protected at rest and in transit, who can change them, and how often they rotate. This tutorial covers IDPWOS repository hardening, LDAPPWD and AUTHINFO secrecy, TLS requirements for MQCSP, rotation and break-glass procedures, lockout interaction with LDAP, backup and DR implications, client-side secret handling, and differences between protecting the LDAP service account versus end-user passwords.

Passwords at Rest on the Queue Manager

IDPWOS entries live in an MQ-managed repository on the queue manager machine. Protect the host: restrict root and mqm group membership, encrypt disks where supported, and control backup access so restore tapes do not become a password leak. LDAPPWD on DEFINE AUTHINFO is part of queue manager configuration—export object definitions for DR but store exports in encrypted artifact repositories, not email attachments. On z/OS, RACF may hold related profiles; follow platform security baselines. DISPLAY AUTHINFO output can reveal whether LDAP is configured; treat command output as sensitive in runbooks.

What MQ stores versus what it does not
CredentialStored in MQ?Protection focus
IDPWOS application passwordYes (repository)Filesystem, admin access, backups
LDAPPWD service bindYes (AUTHINFO)Rotation, limited DISPLAY, vault
LDAP user password (IDPWLDAP)NoDirectory policy, TLS to LDAP
Client password in flightNoTLS on SVRCONN, no logging

Passwords in Transit

MQCSP carries userid and password during MQCONNX. Without TLS, anyone on the network path with capture tools could read them. Configure TRPTYPE(TCP) channels with SSLCIPH and valid certificates. LDAP AUTHINFO may use SECCOMM(YES) and LDAPS port 636 to encrypt directory binds. Firewalls should allow only required paths—MQ hosts to directory, clients to MQ listener—not flat open corporate networks. Weak cipher suites defeat the purpose of TLS; align with corporate crypto standards and disable deprecated protocols.

shell
1
2
3
4
5
6
DEFINE CHANNEL('APP.SVRCONN') CHLTYPE(SVRCONN) TRPTYPE(TCP) + SSLCIPH(TLS_RSA_WITH_AES_256_CBC_SHA256) SSLCAUTH(REQUIRED) DEFINE AUTHINFO('LDAP.AUTH') AUTHTYPE(IDPWLDAP) CONNAME('ldaps.corp.example') + SECCOMM(YES) LDAPUSER('cn=mqbind,ou=svc,o=corp') LDAPPWD('***') ALTER QMGR CONNAUTH('LDAP.AUTH') * Replace cipher and port with site-approved values

Administrative Access to Change Passwords

  • IDPWOS — MQ administrative commands to add, change, or remove users; limit to break-glass and lab roles in production.
  • LDAPPWD — ALTER AUTHINFO requires MQ admin; coordinate LDAP team when rotating bind DN password on both sides.
  • Object exports — runmqsc or MQ Explorer backups may contain LDAPPWD; encrypt artifacts.
  • Audit — log who ran password-changing commands and from which jump host.

Rotation and Expiry

LDAP directories enforce password age and lockout; MQ inherits that behavior for IDPWLDAP users. IDPWOS has no corporate expiry unless you operationalize rotation scripts. Schedule quarterly rotation for LDAPPWD and document simultaneous updates on AUTHINFO and directory. After rotation, restart or refresh depends on platform—test in non-production. Failed rotation causes widespread client connect failures that look like an outage; use maintenance windows and monitoring on CONNAUTH errors.

Client and Application Password Protection

Applications must not log passwords in debug traces. Connection factories in Java should read credentials from environment or vault APIs. CI pipelines should inject secrets at deploy time, not commit them to Git. Shared service accounts reduce password count but complicate revocation—prefer one password per application where OAM granularity matters. Certificate-based authentication removes long-lived passwords from apps when mutual TLS and CHLAUTH mapping are acceptable to security architecture.

Explainer: Locked Safe Versus Checking the Key

Authentication is trying your key in the lock. Password protection is whether the spare key is taped under the doormat, whether the locksmith notebook is in the lobby, and whether anyone can photocopy keys without asking security.

Break-Glass and DR Considerations

DR queue managers need the same AUTHINFO and IDPWOS content or LDAP reachability as production. Restoring an old backup can resurrect retired passwords—reconcile with directory after DR tests. Maintain a small set of IDPWOS break-glass IDs in a sealed process for directory outages, with post-incident password resets mandatory. Document that break-glass IDs have full audit review within 24 hours.

Monitoring and Incident Response

  1. Alert on spikes in CONNAUTH failure messages in AMQERR01.
  2. Correlate with directory lockout events for brute-force attempts.
  3. Revoke compromised IDs in directory and IDPWOS immediately.
  4. Rotate LDAPPWD if bind DN may have leaked.
  5. Review CHLAUTH and TLS if passwords were captured from non-TLS test environments.

Explain Like I'm Five: Password Protection

Your secret word for the treehouse should not be written on the sign outside, shouted across the playground, or copied into every friend's notebook. Password protection means keeping the secret word safe, not just checking if it is right.

Practice Exercises

Exercise 1

Write a rotation runbook for LDAPPWD including rollback steps.

Exercise 2

List where passwords might leak in a typical MQ project (code, logs, backups, email).

Exercise 3

Compare protecting IDPWOS versus relying on LDAP for production.

Frequently Asked Questions

Frequently Asked Questions

Test Your Knowledge

Test Your Knowledge

1. Passwords on the network should use:

  • TLS on the channel
  • FTP
  • Telnet
  • Clear text only

2. LDAPPWD is:

  • QM-to-LDAP service password
  • Every user password stored in MQ
  • DLQ name
  • Cipher suite

3. IDPWOS repository should be:

  • OS-protected and backed up securely
  • World-readable
  • In git
  • On DLQ

4. End-user LDAP passwords in IDPWLDAP are:

  • Not stored in MQ
  • Stored in every queue
  • In XMITQ
  • In cluster repo
Published
Read time17 min
AuthorMainframeMaster
Verified: IBM MQ 9.3 documentation