SEAR logo

 

Security API for RACF (SEAR) - A standardized JSON interface for RACF that enables seamless exploitation by programming languages that have a foreign language interface for C/C++ and native or third-party JSON support. SEAR is a fork of RACFu, an abandoned RACF API created by IBM.

 

SEAR is currently in Alpha, meaning that some core functionality may still be missing, unstable, and or may still need more thorough testing.

 

  • SEAR encodes the data it passes to RACF in Code Page IBM-1047._
  • If you are entering information with special or national characters, users viewing or altering this information from terminals using different or international codepages may see unexpected data.
  • Please consult a list of invariant characters to use for such information if this applies to you.

Mission Statement

As automation becomes more and more prevalent, the need to manage the security environment programmatically increases. On z/OS that means managing a security product like the IBM Resource Access Control Facility (RACF). RACF is the primary facility for managing identity, authority, and access control for z/OS. There are more than 50 callable services with assembler interfaces that are part of the RACF API. The complete set of interfaces can be found in the IBM documentation.

 

While there are a number of languages that can be used to manage RACF, (from low level languages like Assembler to higher level languages like REXX), the need to be able to easily exploit RACF management functions using existing industry standard programming languages and even programming languages that don’t exist yet is paramount. The SEAR project is focused on making RACF management functions available to all programming languages that have native or third-party JSON support and a foreign language interface for C/C++. This will make it easier to pivot to new tools and programming languages as technology, skills, and business needs continue to evolve in the foreseeable future.

Minimum z/OS & Language Versions

All versions of z/OS and the IBM Open Enterprise SDK for Python that are fully supported by IBM are supported by SEAR.

Dependencies

  • R_SecMgtOper (IRRSMO00): Security Management Operations.
  • R_Admin (IRRSEQ00): RACF Administration API.
  • RACF Subsystem Address Space: This is a dependency for both IRRSMO00 and IRRSEQ00. More information can be found in the IBM documentation.

Authorizations

The following authorizations are required in order exploit all of the functionality that SEAR provides.

 

Access General Resource Profile Class Functionality
READ IRR.RADMIN.LISTUSER FACILITY Extract User Profiles
READ IRR.RADMIN.LISTGRP FACILITY Extract Group Profiles
READ IRR.RADMIN.RLIST FACILITY Extract General Resource Profiles
READ IRR.RADMIN.LISTDSD FACILITY Extract Data Set Profiles
READ IRR.RADMIN.SETROPTS.LIST FACILITY List RACF Options
READ IRR.IRRSMO00.PRECHECK XFACILIT Alter and Add Profiles
UPDATE <userid>.IRRSMO00 SURROGAT Run Add, Alter, and Delete Commands as a Specific Userid

Install

 

You may also optionally Download & Install SEAR From GitHub.

 

python3 -m pip install pysear

Use

>>> from sear import sear
>>> result = sear({"operation": "extract", "admin_type": "user", "profile_name": "SQUIDWRD"})
>>> result.result
{'profile': {'base': {'base:audit_logging': False, 'base:read_only_auditor': False, 'base:auditor': False, 'base:automatic_dataset_protection': False, 'base:create_date': '09/13/24', 'base:default_group': 'SYS1', 'base:group_connections': [{'base:group_connection_auditor': False, 'base:group_connection_automatic_dataset_protection': False, 'base:group_connection_create_date': '09/13/24', 'base:group_connection_dataset_access': False, 'base:group_connection_group': 'SYS1', 'base:group_connection_last_connect_date': None, 'base:group_connection_last_connect_time': None, 'base:group_connection_operations': False, 'base:group_connection_owner': 'LEONARD', 'base:group_connection_resume_date': None, 'base:group_connection_revoke_date': None, 'base:group_connection_revoked': False, 'base:group_connection_special': False, 'base:group_connection_universal_access': 'NONE', 'base:group_connection_used_count': 0}], 'base:group_dataset_access': False, 'base:has_passphrase': False, 'base:has_password': False, 'base:logon_allowed_days': [{'base:logon_allowed_day': 'SUNDAY'}, {'base:logon_allowed_day': 'MONDAY'}, {'base:logon_allowed_day': 'TUESDAY'}, {'base:logon_allowed_day': 'WEDNESDAY'}, {'base:logon_allowed_day': 'THURSDAY'}, {'base:logon_allowed_day': 'FRIDAY'}, {'base:logon_allowed_day': 'SATURDAY'}], 'base:logon_allowed_time': 'ANYTIME', 'base:mfa_password_fallback': False, 'base:name': 'SQUIDWARD', 'base:operations': False, 'base:owner': 'LEONARD', 'base:passphrase_change_interval': 0, 'base:passphrase_enveloped': False, 'base:password_change_interval': 186, 'base:password_enveloped': False, 'base:protected': True, 'base:restrict_global_access_checking': False, 'base:revoked': False, 'base:special': False}, 'omvs': {'omvs:home_directory': '/u/squidwrd', 'omvs:uid': 24}}, 'return_codes': {'racf_reason_code': 0, 'racf_return_code': 0, 'sear_return_code': 0, 'saf_return_code': 0}}

Architecture

 

Just because a Programming Language Exploiter is shown on this architecture diagram does not mean that there is or will be an interface created, maintained, and distributed by the SEAR team for that programming language. The interfaces currently maintained and distributed by the SEAR team can be found in the interfaces page.

 

flowchart TD
 subgraph s1["C/C++"]
        n1["Security API for RACF (SEAR)"]
        n2@{ label: "<span style=\"padding-left:\">IRRSMO00 (64-bit OSLINK EBCDIC)</span>" }
        n5["User, group, dataset, and resource operation (Add, alter, delete)"]
        n11["IRRSDL64"]
        n12["Certificate managment operation (Add, extract, delete)"]
        n7@{ label: "<span style=\"padding-left:\">User, group, dataset, and resource operation</span>(Extract or Search)" }
  end
 subgraph s2["HLASM"]
        n4["IRRSEQ00 (31-bit OSLINK EBCDIC)"]
  end
    A["Python interface"] --- n3@{ label: "<span style=\"padding-left:\">JSON (ASCII)</span>" }
    n3 --- n1
    n1 --- n5 & n7 & n12
    n5 --- n2
    n2 --- n6["Binary (EBCDIC)"]
    n6 --- n4
    n7 --- n8["Binary (EBCDIC)"]
    n8 --- n4
    n10["SAF"] --- n9["RACF"]
    n4 --- n10
    n12 --- n11
    n13["Golang (future interface)"] --- n14@{ label: "<span style=\"padding-left:\">JSON (ASCII)</span>" }
    n14 --- n1
    n15["Java (future interface)"] --- n16@{ label: "<span style=\"padding-left:\">JSON (ASCII)</span>" }
    n16 --- n1
    n17["Node.js (future interface)"] --- n18@{ label: "<span style=\"padding-left:\">JSON (ASCII)</span>" }
    n18 --- n1
    n11 --- n19["Binary (EBCDIC)"]
    n19 --- n10
    n20["C/C++ interface"] --- n21@{ label: "<span style=\"padding-left:\">JSON (ASCII)</span>" }
    n21 --- n1
    n1@{ shape: rounded}
    n2@{ shape: rounded}
    n5@{ shape: rounded}
    n11@{ shape: rounded}
    n12@{ shape: rounded}
    n7@{ shape: rounded}
    n4@{ shape: rounded}
    A@{ shape: rounded}
    n3@{ shape: text}
    n6@{ shape: text}
    n8@{ shape: text}
    n10@{ shape: rounded}
    n9@{ shape: cyl}
    n13@{ shape: rounded}
    n14@{ shape: text}
    n15@{ shape: rounded}
    n16@{ shape: text}
    n17@{ shape: rounded}
    n18@{ shape: text}
    n19@{ shape: text}
    n20@{ shape: rounded}
    n21@{ shape: text}
     n1:::Class_08
     n2:::Class_06
     n5:::Class_07
     n11:::Class_06
     n12:::Class_07
     n7:::Class_07
     n4:::Class_06
     A:::Pine
     A:::Class_01
     A:::Class_01
     A:::Class_01
     n3:::Ash
     n6:::Ash
     n8:::Ash
     n10:::Class_05
     n9:::Class_05
     n13:::Pine
     n13:::Class_01
     n13:::Class_02
     n14:::Ash
     n15:::Pine
     n15:::Class_01
     n15:::Class_02
     n15:::Class_03
     n15:::Class_03
     n16:::Ash
     n17:::Pine
     n17:::Class_01
     n17:::Class_02
     n17:::Class_03
     n17:::Class_03
     n17:::Class_04
     n18:::Ash
     n19:::Ash
     n20:::Pine
     n20:::Class_01
     n20:::Class_01
     n20:::Class_01
     n20:::Class_09
     n21:::Ash
    classDef Pine stroke-width:1px, stroke-dasharray:none, stroke:#254336, fill:#27654A, color:#FFFFFF
    classDef Class_02 fill:#68d7e2, color:#000000
    classDef Class_03 fill:#ec2025, color:#FFFFFF, stroke:#000000
    classDef Class_01 fill:#FFD600, color:#000000
    classDef Class_04 fill:#417e38, color:#FFFFFF, stroke:transparent
    classDef Ash stroke-width:1px, stroke-dasharray:none, stroke:#999999, fill:#EEEEEE, color:#000000
    classDef Class_06 stroke:#2962FF, fill:#2962FF, color:#FFFFFF
    classDef Class_05 fill:#757575, color:#FFFFFF
    classDef Class_07 fill:#FF6D00, color:#FFFFFF
    classDef Class_08 fill:#FFFFFF, color:#000000, stroke:#000000
    classDef Class_09 fill:#00559e, stroke:transparent, color:#FFFFFF


Table of contents