Previous Topic: Conceptual Diagram of CA Disk Auto-Restore MethodsNext Topic: Test Auto-Restore Hook Interface


Installing the Auto-Restore Function

The auto-restore function applies to MVS installations only, and should be implemented only after a thorough review of the following installation procedure. Be sure to complete each step in the process before continuing to the next. The following discussion applies to all three hooks.

To install the Auto-Restore Function

  1. See the procedure named DMSAR in the proclib library shipped with your CA Disk system. In particular, see the following items:

    Note: If you rename the DMSAR catalog procedure, you must also change the value of sysparm ARTASKNM (the default name is DMSAR). Otherwise, the support does not work.

    Front-End Method

    This method is always in effect and works well if your security package does not use strict volume rules (for example, a user might have access to a data set on one volume, but does not have access to it on another volume), and you do not make extensive use of discrete RACF profiles.

    CA Disk auto-restore processing uses the System Authorization Facility (SAF) to determine if the user has READ access to the data set name in question. Unfortunately, the auto-restore front-end processing does not have actual volume or discrete RACF profile information available. If queried from the catalog management hook, CA Disk passes to SAF the CA Disk pseudo- volume volser along with the data set name. If queried from the S213 exit, CA Disk passes to SAF the volume on which the OPEN was attempted along with the data set name. CA Disk allows the auto-restore to proceed only if it receives a return code of less than 8 from SAF.

    If you are an CA ACF2 user, you must activate your SAF interface to let the SAF call issued by CA Disk work properly. Also, you must add the following entry to your SAFPROT GSO list:

        SAFPROT.DMS CLASSES(DATA SET) CNTLPTS(ADSAR010)
        SUBSYS(DMS)
    
    Back-End Method

    If you use the CA Disk RACF security interface, or if you use the CA Disk/CA Top Secret Security interface and have implemented the facility activated by sysparm ARSECURE, you can use this additional method.

    Note: For more information, see the section Installing the CA Top Secret Security Interface in the chapter "Installation".

    To install this method, specify sysparm ARSECURE with a value of R or Y. For more information, see the sysparm description for ARSECUREn in the Systems Guide.

  2. See the documentation for sysparms ARESUNIT, ARESUNIC, and ARESUNIn (if multiple types of cartridge devices are used). If the defaults are unacceptable, specify their values in your production sysparms.
  3. See the documentation for sysparm ARTAPEOK. This sysparm controls the degree to which tape mounts will be accepted--if at all--from auto-restore tasks.
  4. See the documentation for user exit ARESPREX. This user screening exit can selectively reject auto-restore requests, and can also perform logging activities.
  5. If you are installing the catalog management hook and the DFHSM SVC hook, you can use pool support as well. Pool support allows you to dynamically decide the volume to which to restore a data set, based on a combination of pool definitions and an optional user exit. See the Setting Up DASD Pools for Auto-Restore section. This does not have to done at installation time. You can install the basic auto-restore facilities first and add pool support later.
  6. The catalog management hook and DFHSM SVC hook of CA Disk are installed with a started task. A system IPL is not required. You install the hooks by issuing the following command from the operator's console:
    S DMSAR,DMSAR=INSTALL
    

    Output is directed back to the operator's console. When the interface is successfully installed, this started task will end.

    Implementation Notes: