Regardless of whether or not the CA Disk Security Interface for CA Top Secret is installed, several items must be done for CA Disk to run effectively on a system using CA Top Secret.
Other alternatives are also possible. Individual users can process (archive, restore, and so on.) for only those data sets they are authorized too.
If you intend to set CA Disk sysparm ARSECURE, according to the supplier of CA Top Secret, you must set up CA Disk as an CA Top Secret Facility. Perform the following steps:
Create the facility by using the following CA Top Secret Control Options:
FAC(USERx=NAME=DMSOS) FAC(DMSOS=PGM=ADS) FAC(DMSOS=ACTIVE,NOABEND,NOASUBM,NOAUDIT,AUTHINIT) FAC(DMSOS=ID=facilitycode) FAC(DMSOS=NOINSTDATA,KEY=8,LCFCMD,LOCKTIME=0) FAC(DMSOS=NOLUMSG,LOG(MSG)) FAC(DMSOS=SUAS,NORNDPW,RES,SIGN(M)) FAC(DMSOS=NOSHRPRF,NOSTMSG,NOTSOC,WARNPW) FAC(DMSOS=NOXDEF)
TSS CREATE(DMSAR) NAME('DMS AUTO-RESTORE')-
FAC(STC) TYPE(USER) PASS(NOPW) -
DEPT(deptname) MASTFAC(DMSOS)
INSERT SAFDEF.adsds1 RB(ADSMI002) NOAPFCHK RACROUTE(REQUEST=AUTH,CLASS=FACILITY,STATUS=ACCESS,ENTITY=STGADMIN.DMS.-)
This will allow the CA Disk ISPF Dialog the ability to determine access to the FACILITY class profile without causing a violation or the S047 Abend. The operand of the ENTITY parameter (STGADMIN.DMS.-) may need to be changed if the default CA Disk Facility names are not used. The default value of SMSSTGAD is STGADMIN.DMS.STGADMIN which is the value ENTITY= in the sample SAFDEF shown previously.
TSS ADDTO(STC) PROC(DMSAR) ACID(DMSAR)
TSS ADD(DMSAR) FAC(DMSOS)
This section contains the following topics:
Installing the CA Top Secret Security Interface
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|