IZUG846W: An HTTP request for a z/OSMF REST service was received from a remote site

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
2
down vote

favorite












I setup z/OSMF and I am receiving this error when attempting to access the url https://my.zos.com/zosmf/restjobs/jobs.




“errorID”:“IZUG846W”,“errorMsg”:“IZUG846W: An HTTP request for a
z/OSMF REST service was received from a remote site. The request was
rejected, however, because the remote site “” is not permitted to
z/OSMF server “IZUSVR” on target system “my.zos.com” .“




The error message is does not provide sufficient information to identify the root cause. Has someone else hit this issue?










share|improve this question



























    up vote
    2
    down vote

    favorite












    I setup z/OSMF and I am receiving this error when attempting to access the url https://my.zos.com/zosmf/restjobs/jobs.




    “errorID”:“IZUG846W”,“errorMsg”:“IZUG846W: An HTTP request for a
    z/OSMF REST service was received from a remote site. The request was
    rejected, however, because the remote site “” is not permitted to
    z/OSMF server “IZUSVR” on target system “my.zos.com” .“




    The error message is does not provide sufficient information to identify the root cause. Has someone else hit this issue?










    share|improve this question

























      up vote
      2
      down vote

      favorite









      up vote
      2
      down vote

      favorite











      I setup z/OSMF and I am receiving this error when attempting to access the url https://my.zos.com/zosmf/restjobs/jobs.




      “errorID”:“IZUG846W”,“errorMsg”:“IZUG846W: An HTTP request for a
      z/OSMF REST service was received from a remote site. The request was
      rejected, however, because the remote site “” is not permitted to
      z/OSMF server “IZUSVR” on target system “my.zos.com” .“




      The error message is does not provide sufficient information to identify the root cause. Has someone else hit this issue?










      share|improve this question















      I setup z/OSMF and I am receiving this error when attempting to access the url https://my.zos.com/zosmf/restjobs/jobs.




      “errorID”:“IZUG846W”,“errorMsg”:“IZUG846W: An HTTP request for a
      z/OSMF REST service was received from a remote site. The request was
      rejected, however, because the remote site “” is not permitted to
      z/OSMF server “IZUSVR” on target system “my.zos.com” .“




      The error message is does not provide sufficient information to identify the root cause. Has someone else hit this issue?







      mainframe zos zosmf






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Sep 6 at 13:13

























      asked Sep 6 at 1:45









      Hogstrom

      703115




      703115




















          3 Answers
          3






          active

          oldest

          votes

















          up vote
          3
          down vote



          accepted










          It is preferable, and I believe it is the default, to keep CSRF_SWITCH(ON), which requires a whitelist to be setup so that only hosts in the whitelist can originate requests.



          The whitelist is a RACF ZMFAPLA resource class profile of the form IZUDFLT.ZOSMF.REST.<zosmf-service>.<reversed-host-name>. All such profiles must be defined with UACC(NONE) and permit READ access to the server's ID (default is IZUSVR).



          An example profile IZUDFLT.ZOSMF.REST.*.com.whoa.test.myserver, will allow inbound cross-origin requests from the host name myserver.test.whoa.com. Same origin requests such as those from a web browser that is accessing the z/OSMF host directly are not subject to CSRF protection.






          share|improve this answer






















          • Thanks John. That is why I called out that z/OSMF is setup in a secure mode and provided references to other materials for consideration.
            – Hogstrom
            Sep 6 at 2:32

















          up vote
          1
          down vote













          By default z/OSMF is configured in a secure mode so as not to open up an accidental security hole. The message provided indicates that the remote system (source of the REST call) may potentially be unsecure. This means that the request is denied.



          One way of avoiding this issue is to modify the IZUPRMnn member that initializes z/OSMF. The parameter:



          CSRF_SWITCH(ON) which is the default can be changed to
          CSRF_SWITCH(OFF) this disables the cross site scripting safety mechanism.



          The parameters for z/OSMF can be found here.



          The specific entry for CSRF_SWITCH is included for reference below and is based on z/OS 2.3.




          CSRF_SWITCH(ON|OFF)



          Indicates whether Cross Site Request Forgery
          (CSRF) custom header checking is enabled for REST API requests. By
          default, CSRF_SWITCH is set to ON to ensure that your installation is
          protected against CSRF attacks. However, in some limited cases, such
          as for testing, you might choose to temporarily disable CSRF checking
          by setting CSRF_SWITCH=OFF. However, it is recommended that you leave
          this setting enabled to prevent CSRF attacks. For more information,
          see IBM z/OS Management Facility Programming Guide. Default: ON




          More information on z/OSMF Configuration can be be found here






          share|improve this answer



























            up vote
            1
            down vote













            If you are generating the REST request yourself you can add the header X-CSRF-ZOSMF-HEADER with any value to get around this. Firefox postman for example lets you add the header I've got a picture of before and after in postman



            Another good way to deal with a fussy z/OSMF server is to drive the API through CURL



            curl -k -H "X-CSRF-ZOSMF-HEADER: dummy" -u : https://:/zosmf/restfiles/ds?dslevel=T*



            In zowe.org we provide a set of REST APIs that don't insist on the header and abstract some of the nuances of z/OSMF, as well as a command line interface and a nifty looking JES explorer as well as couple of file explorers for data sets and USS files that run in a browser, so if you've got a moment swing by zowe.org and let us know if it helps at all.



            Cheers,



            Joe






            share|improve this answer




















              Your Answer







              StackExchange.ready(function()
              var channelOptions =
              tags: "".split(" "),
              id: "3"
              ;
              initTagRenderer("".split(" "), "".split(" "), channelOptions);

              StackExchange.using("externalEditor", function()
              // Have to fire editor after snippets, if snippets enabled
              if (StackExchange.settings.snippets.snippetsEnabled)
              StackExchange.using("snippets", function()
              createEditor();
              );

              else
              createEditor();

              );

              function createEditor()
              StackExchange.prepareEditor(
              heartbeatType: 'answer',
              convertImagesToLinks: true,
              noModals: false,
              showLowRepImageUploadWarning: true,
              reputationToPostImages: 10,
              bindNavPrevention: true,
              postfix: "",
              onDemand: true,
              discardSelector: ".discard-answer"
              ,immediatelyShowMarkdownHelp:true
              );



              );













               

              draft saved


              draft discarded


















              StackExchange.ready(
              function ()
              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1355676%2fizug846w-an-http-request-for-a-z-osmf-rest-service-was-received-from-a-remote-s%23new-answer', 'question_page');

              );

              Post as a guest






























              3 Answers
              3






              active

              oldest

              votes








              3 Answers
              3






              active

              oldest

              votes









              active

              oldest

              votes






              active

              oldest

              votes








              up vote
              3
              down vote



              accepted










              It is preferable, and I believe it is the default, to keep CSRF_SWITCH(ON), which requires a whitelist to be setup so that only hosts in the whitelist can originate requests.



              The whitelist is a RACF ZMFAPLA resource class profile of the form IZUDFLT.ZOSMF.REST.<zosmf-service>.<reversed-host-name>. All such profiles must be defined with UACC(NONE) and permit READ access to the server's ID (default is IZUSVR).



              An example profile IZUDFLT.ZOSMF.REST.*.com.whoa.test.myserver, will allow inbound cross-origin requests from the host name myserver.test.whoa.com. Same origin requests such as those from a web browser that is accessing the z/OSMF host directly are not subject to CSRF protection.






              share|improve this answer






















              • Thanks John. That is why I called out that z/OSMF is setup in a secure mode and provided references to other materials for consideration.
                – Hogstrom
                Sep 6 at 2:32














              up vote
              3
              down vote



              accepted










              It is preferable, and I believe it is the default, to keep CSRF_SWITCH(ON), which requires a whitelist to be setup so that only hosts in the whitelist can originate requests.



              The whitelist is a RACF ZMFAPLA resource class profile of the form IZUDFLT.ZOSMF.REST.<zosmf-service>.<reversed-host-name>. All such profiles must be defined with UACC(NONE) and permit READ access to the server's ID (default is IZUSVR).



              An example profile IZUDFLT.ZOSMF.REST.*.com.whoa.test.myserver, will allow inbound cross-origin requests from the host name myserver.test.whoa.com. Same origin requests such as those from a web browser that is accessing the z/OSMF host directly are not subject to CSRF protection.






              share|improve this answer






















              • Thanks John. That is why I called out that z/OSMF is setup in a secure mode and provided references to other materials for consideration.
                – Hogstrom
                Sep 6 at 2:32












              up vote
              3
              down vote



              accepted







              up vote
              3
              down vote



              accepted






              It is preferable, and I believe it is the default, to keep CSRF_SWITCH(ON), which requires a whitelist to be setup so that only hosts in the whitelist can originate requests.



              The whitelist is a RACF ZMFAPLA resource class profile of the form IZUDFLT.ZOSMF.REST.<zosmf-service>.<reversed-host-name>. All such profiles must be defined with UACC(NONE) and permit READ access to the server's ID (default is IZUSVR).



              An example profile IZUDFLT.ZOSMF.REST.*.com.whoa.test.myserver, will allow inbound cross-origin requests from the host name myserver.test.whoa.com. Same origin requests such as those from a web browser that is accessing the z/OSMF host directly are not subject to CSRF protection.






              share|improve this answer














              It is preferable, and I believe it is the default, to keep CSRF_SWITCH(ON), which requires a whitelist to be setup so that only hosts in the whitelist can originate requests.



              The whitelist is a RACF ZMFAPLA resource class profile of the form IZUDFLT.ZOSMF.REST.<zosmf-service>.<reversed-host-name>. All such profiles must be defined with UACC(NONE) and permit READ access to the server's ID (default is IZUSVR).



              An example profile IZUDFLT.ZOSMF.REST.*.com.whoa.test.myserver, will allow inbound cross-origin requests from the host name myserver.test.whoa.com. Same origin requests such as those from a web browser that is accessing the z/OSMF host directly are not subject to CSRF protection.







              share|improve this answer














              share|improve this answer



              share|improve this answer








              edited Sep 6 at 3:18









              Hogstrom

              703115




              703115










              answered Sep 6 at 1:57









              John Czukkermann

              617




              617











              • Thanks John. That is why I called out that z/OSMF is setup in a secure mode and provided references to other materials for consideration.
                – Hogstrom
                Sep 6 at 2:32
















              • Thanks John. That is why I called out that z/OSMF is setup in a secure mode and provided references to other materials for consideration.
                – Hogstrom
                Sep 6 at 2:32















              Thanks John. That is why I called out that z/OSMF is setup in a secure mode and provided references to other materials for consideration.
              – Hogstrom
              Sep 6 at 2:32




              Thanks John. That is why I called out that z/OSMF is setup in a secure mode and provided references to other materials for consideration.
              – Hogstrom
              Sep 6 at 2:32












              up vote
              1
              down vote













              By default z/OSMF is configured in a secure mode so as not to open up an accidental security hole. The message provided indicates that the remote system (source of the REST call) may potentially be unsecure. This means that the request is denied.



              One way of avoiding this issue is to modify the IZUPRMnn member that initializes z/OSMF. The parameter:



              CSRF_SWITCH(ON) which is the default can be changed to
              CSRF_SWITCH(OFF) this disables the cross site scripting safety mechanism.



              The parameters for z/OSMF can be found here.



              The specific entry for CSRF_SWITCH is included for reference below and is based on z/OS 2.3.




              CSRF_SWITCH(ON|OFF)



              Indicates whether Cross Site Request Forgery
              (CSRF) custom header checking is enabled for REST API requests. By
              default, CSRF_SWITCH is set to ON to ensure that your installation is
              protected against CSRF attacks. However, in some limited cases, such
              as for testing, you might choose to temporarily disable CSRF checking
              by setting CSRF_SWITCH=OFF. However, it is recommended that you leave
              this setting enabled to prevent CSRF attacks. For more information,
              see IBM z/OS Management Facility Programming Guide. Default: ON




              More information on z/OSMF Configuration can be be found here






              share|improve this answer
























                up vote
                1
                down vote













                By default z/OSMF is configured in a secure mode so as not to open up an accidental security hole. The message provided indicates that the remote system (source of the REST call) may potentially be unsecure. This means that the request is denied.



                One way of avoiding this issue is to modify the IZUPRMnn member that initializes z/OSMF. The parameter:



                CSRF_SWITCH(ON) which is the default can be changed to
                CSRF_SWITCH(OFF) this disables the cross site scripting safety mechanism.



                The parameters for z/OSMF can be found here.



                The specific entry for CSRF_SWITCH is included for reference below and is based on z/OS 2.3.




                CSRF_SWITCH(ON|OFF)



                Indicates whether Cross Site Request Forgery
                (CSRF) custom header checking is enabled for REST API requests. By
                default, CSRF_SWITCH is set to ON to ensure that your installation is
                protected against CSRF attacks. However, in some limited cases, such
                as for testing, you might choose to temporarily disable CSRF checking
                by setting CSRF_SWITCH=OFF. However, it is recommended that you leave
                this setting enabled to prevent CSRF attacks. For more information,
                see IBM z/OS Management Facility Programming Guide. Default: ON




                More information on z/OSMF Configuration can be be found here






                share|improve this answer






















                  up vote
                  1
                  down vote










                  up vote
                  1
                  down vote









                  By default z/OSMF is configured in a secure mode so as not to open up an accidental security hole. The message provided indicates that the remote system (source of the REST call) may potentially be unsecure. This means that the request is denied.



                  One way of avoiding this issue is to modify the IZUPRMnn member that initializes z/OSMF. The parameter:



                  CSRF_SWITCH(ON) which is the default can be changed to
                  CSRF_SWITCH(OFF) this disables the cross site scripting safety mechanism.



                  The parameters for z/OSMF can be found here.



                  The specific entry for CSRF_SWITCH is included for reference below and is based on z/OS 2.3.




                  CSRF_SWITCH(ON|OFF)



                  Indicates whether Cross Site Request Forgery
                  (CSRF) custom header checking is enabled for REST API requests. By
                  default, CSRF_SWITCH is set to ON to ensure that your installation is
                  protected against CSRF attacks. However, in some limited cases, such
                  as for testing, you might choose to temporarily disable CSRF checking
                  by setting CSRF_SWITCH=OFF. However, it is recommended that you leave
                  this setting enabled to prevent CSRF attacks. For more information,
                  see IBM z/OS Management Facility Programming Guide. Default: ON




                  More information on z/OSMF Configuration can be be found here






                  share|improve this answer












                  By default z/OSMF is configured in a secure mode so as not to open up an accidental security hole. The message provided indicates that the remote system (source of the REST call) may potentially be unsecure. This means that the request is denied.



                  One way of avoiding this issue is to modify the IZUPRMnn member that initializes z/OSMF. The parameter:



                  CSRF_SWITCH(ON) which is the default can be changed to
                  CSRF_SWITCH(OFF) this disables the cross site scripting safety mechanism.



                  The parameters for z/OSMF can be found here.



                  The specific entry for CSRF_SWITCH is included for reference below and is based on z/OS 2.3.




                  CSRF_SWITCH(ON|OFF)



                  Indicates whether Cross Site Request Forgery
                  (CSRF) custom header checking is enabled for REST API requests. By
                  default, CSRF_SWITCH is set to ON to ensure that your installation is
                  protected against CSRF attacks. However, in some limited cases, such
                  as for testing, you might choose to temporarily disable CSRF checking
                  by setting CSRF_SWITCH=OFF. However, it is recommended that you leave
                  this setting enabled to prevent CSRF attacks. For more information,
                  see IBM z/OS Management Facility Programming Guide. Default: ON




                  More information on z/OSMF Configuration can be be found here







                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered Sep 6 at 1:45









                  Hogstrom

                  703115




                  703115




















                      up vote
                      1
                      down vote













                      If you are generating the REST request yourself you can add the header X-CSRF-ZOSMF-HEADER with any value to get around this. Firefox postman for example lets you add the header I've got a picture of before and after in postman



                      Another good way to deal with a fussy z/OSMF server is to drive the API through CURL



                      curl -k -H "X-CSRF-ZOSMF-HEADER: dummy" -u : https://:/zosmf/restfiles/ds?dslevel=T*



                      In zowe.org we provide a set of REST APIs that don't insist on the header and abstract some of the nuances of z/OSMF, as well as a command line interface and a nifty looking JES explorer as well as couple of file explorers for data sets and USS files that run in a browser, so if you've got a moment swing by zowe.org and let us know if it helps at all.



                      Cheers,



                      Joe






                      share|improve this answer
























                        up vote
                        1
                        down vote













                        If you are generating the REST request yourself you can add the header X-CSRF-ZOSMF-HEADER with any value to get around this. Firefox postman for example lets you add the header I've got a picture of before and after in postman



                        Another good way to deal with a fussy z/OSMF server is to drive the API through CURL



                        curl -k -H "X-CSRF-ZOSMF-HEADER: dummy" -u : https://:/zosmf/restfiles/ds?dslevel=T*



                        In zowe.org we provide a set of REST APIs that don't insist on the header and abstract some of the nuances of z/OSMF, as well as a command line interface and a nifty looking JES explorer as well as couple of file explorers for data sets and USS files that run in a browser, so if you've got a moment swing by zowe.org and let us know if it helps at all.



                        Cheers,



                        Joe






                        share|improve this answer






















                          up vote
                          1
                          down vote










                          up vote
                          1
                          down vote









                          If you are generating the REST request yourself you can add the header X-CSRF-ZOSMF-HEADER with any value to get around this. Firefox postman for example lets you add the header I've got a picture of before and after in postman



                          Another good way to deal with a fussy z/OSMF server is to drive the API through CURL



                          curl -k -H "X-CSRF-ZOSMF-HEADER: dummy" -u : https://:/zosmf/restfiles/ds?dslevel=T*



                          In zowe.org we provide a set of REST APIs that don't insist on the header and abstract some of the nuances of z/OSMF, as well as a command line interface and a nifty looking JES explorer as well as couple of file explorers for data sets and USS files that run in a browser, so if you've got a moment swing by zowe.org and let us know if it helps at all.



                          Cheers,



                          Joe






                          share|improve this answer












                          If you are generating the REST request yourself you can add the header X-CSRF-ZOSMF-HEADER with any value to get around this. Firefox postman for example lets you add the header I've got a picture of before and after in postman



                          Another good way to deal with a fussy z/OSMF server is to drive the API through CURL



                          curl -k -H "X-CSRF-ZOSMF-HEADER: dummy" -u : https://:/zosmf/restfiles/ds?dslevel=T*



                          In zowe.org we provide a set of REST APIs that don't insist on the header and abstract some of the nuances of z/OSMF, as well as a command line interface and a nifty looking JES explorer as well as couple of file explorers for data sets and USS files that run in a browser, so if you've got a moment swing by zowe.org and let us know if it helps at all.



                          Cheers,



                          Joe







                          share|improve this answer












                          share|improve this answer



                          share|improve this answer










                          answered Sep 6 at 18:34









                          Joe Winchester

                          112




                          112



























                               

                              draft saved


                              draft discarded















































                               


                              draft saved


                              draft discarded














                              StackExchange.ready(
                              function ()
                              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1355676%2fizug846w-an-http-request-for-a-z-osmf-rest-service-was-received-from-a-remote-s%23new-answer', 'question_page');

                              );

                              Post as a guest













































































                              這個網誌中的熱門文章

                              How to combine Bézier curves to a surface?

                              Mutual Information Always Non-negative

                              Why am i infinitely getting the same tweet with the Twitter Search API?