Previous Topic: CASCMM--2-Verify the CA Endevor SCM Table Data SetNext Topic: CASCMM--Secure Access to Functions


Secure Your Data Sets

Important! We recommend that you use the Alternate ID to secure your data sets, however you can use CA ACF2 or CA Top Secret program pathing. For more information, see the chapter "Implementing Data Set Security" in the Security Guide.

The CA Endevor SCM Alternate ID allows you to secure CA Endevor SCM data sets from updates outside of CA Endevor SCM while allowing users to perform functions that update those data sets from within CA Endevor SCM. Prior to any action that accesses a CA Endevor SCM data set, the Alternate ID is swapped for the user's ID and the access is performed using the Alternate ID.

Typically, you should secure a high–level qualifier as READ/WRITE for CA Endevor SCM, READ/WRITE/UPDATE for the Administrator, and READ for everyone else.

CA Endevor SCM data sets include (but are not limited to) the following:

Note: Ask the systems programmer, who installed CA Endevor SCM at your site, for the data set names.

To secure your data sets

  1. Define a user ID for CA Endevor SCM to use as an Alternate ID to your security software product (CA Top Secret, CA ACF2 or RACF).
  2. Grant the Alternate ID CONTROL access to all CA Endevor SCM VSAM files and UPDATE access to Source Output and any other libraries and files that are to be written to. A single HLQ (uprfx) is used in the Rapid Implementation setup job, so you can grant access to all the data sets using one rule.
  3. Supply the Alternate ID to the RACFUID= parameter in your C1DEFLTS table.

Example: Grant Alternate ID Access to Data Sets

If all your CA Endevor SCM data sets are under one high–level qualifier, you can grant the Alternate ID access to all the data sets using one rule. The CA ACF2 rule is shown next:

uprfx.** R(A) W(A) C(A)

Note: For more information on the Alternate ID, see the Security Guide.