To install the CA Top Secret Interface, perform the following procedure.
To install the CA Top Secret Interface
If you create volume-level backups with the VBACKUP command, CA Disk backs up each volume, tracking this information by the esoteric data set name DMSOS.Vvolser, where volser is the volume being backed up.
BACKUP, VBACKUP, and IXMAINT functions each query any CA Disk Security Interfaces for authority to process these names.
If you plan to use the SELECT VTOCS DSCL statement, or the VBACKUP command, make sure that BACKUP, VBACKUP, and IXMAINT functions can each access this fictitious data set name.
Under most versions of IBM operating systems, OPEN, SCRATCH, and RENAME processing will query CA Top Secret for authorization, regardless of the setting of the RACF-indicator bit. This feature is called always call. Data sets cataloged in ICF catalogs also cause a query of CA Top Secret for authorization, regardless of the setting of the RACF‑indicator bit.
Under some operating systems, data sets not cataloged in ICF catalogs queries CA Top Secret only if the RACF-indicator bit is on. For non‑VSAM data sets, the RACF-indicator bit is the DS1IND40 bit (bit x'40' at offset 93 x'5D') located in the data set's format-1 DSCB.
CA Disk security processing normally queries CA Top Secret for authorization, regardless of the setting of the RACF-indicator bit. If you do not have the always call feature of the operating system and you do not use ICF catalogs, specify sysparm TOPSALWZ with a value of N in the SYSPARMS member of the parmlib data set.
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|