The auto-restore function applies to MVS installations only, and should be implemented only after a thorough review of the following installation procedure. Be sure to complete each step in the process before continuing to the next. The following discussion applies to all three hooks.
To install the Auto-Restore Function
Note: If you rename the DMSAR catalog procedure, you must also change the value of sysparm ARTASKNM (the default name is DMSAR). Otherwise, the support does not work.
Note: The FILES DD statement is ignored if there is also an MFILES DD statement in the procedure. Note that concatenated files data sets are not supported with the FILES DD statement.
This method is always in effect and works well if your security package does not use strict volume rules (for example, a user might have access to a data set on one volume, but does not have access to it on another volume), and you do not make extensive use of discrete RACF profiles.
CA Disk auto-restore processing uses the System Authorization Facility (SAF) to determine if the user has READ access to the data set name in question. Unfortunately, the auto-restore front-end processing does not have actual volume or discrete RACF profile information available. If queried from the catalog management hook, CA Disk passes to SAF the CA Disk pseudo- volume volser along with the data set name. If queried from the S213 exit, CA Disk passes to SAF the volume on which the OPEN was attempted along with the data set name. CA Disk allows the auto-restore to proceed only if it receives a return code of less than 8 from SAF.
If you are an CA ACF2 user, you must activate your SAF interface to let the SAF call issued by CA Disk work properly. Also, you must add the following entry to your SAFPROT GSO list:
SAFPROT.DMS CLASSES(DATA SET) CNTLPTS(ADSAR010)
SUBSYS(DMS)
If you use the CA Disk RACF security interface, or if you use the CA Disk/CA Top Secret Security interface and have implemented the facility activated by sysparm ARSECURE, you can use this additional method.
Note: For more information, see the section Installing the CA Top Secret Security Interface in the chapter "Installation".
To install this method, specify sysparm ARSECURE with a value of R or Y. For more information, see the sysparm description for ARSECUREn in the Systems Guide.
S DMSAR,DMSAR=INSTALL
Output is directed back to the operator's console. When the interface is successfully installed, this started task will end.
Implementation Notes:
If access to these resources is not granted, the DMSAR INSTALL fails with a DIM427I message. For more information, see Granting or Denying Access to System-Installed Intercept Modules.
You can check if the CA Disk catalog management hook and DFHSM SVC hook are installed by issuing the operator command:
S DMSAR,DMSAR=STATUS
or simply:
S DMSAR
You can remove the CA Disk catalog management hook and DFHSM SVC hook by issuing the operator command:
S DMSAR,DMSAR=REMOVE
If you do issue this removal command, there are several processing steps to be aware of:
After a remove command is accepted, the SVC table entries for SVC 26 and the DFHSM SVC are modified to point to their original addresses. This disables the hooks. The removal task waits eight seconds so that current requests can complete, then DMSAR deletes its hooks from CSA memory. The hooks are completely removed and the started task terminates.
Similar diagnostic facilities are provided for the CA Disk SVC module and VSAM date stamp module. The default jobname for the other diagnostic facilities is DMSTEST, so you can make this the same name for all functions. The ability to change the job names for the other functions is discussed where applicable.
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|