This chapter describes the tasks needed to deploy [set the DSI variable value for your book] in your environment.
Note: Skip this chapter if you use CA MSM to deploy [set the DSI variable value for your book].
This section contains the following topics:
When CA Tape Encryption is operational the BES primary and mirror databases are secure.
To verify that CA Tape Encryption is operational
S BES.stepname
Defines the subsystem name.
Values: BES1 to BES8
The BES address space starts and dynamically updates the stepname value into the subsystem name table and uses it as its subsystem name.
BESn D S
Specifies the BES address space. This must be the same number used in step 1.
The output of the command shows the following:
The integrity of the BES primary database and the BES mirror database is secured.
Important! Keep a record of the pass phrase stored securely and with restricted access. The pass phrase is required when starting a disaster recovery system or when upgrading to a different central processing unit.
For the CA 1, CA TLMS, and Third Party Tape Management System Options, you can verify the basic functionality of CA Tape Encryption by running job BESIVP in the CTAPJCL data set. The BESIVP job runs IEBGENER in the following three steps to verify encryption and decryption processing:
All steps must run with a condition code of 00. If CA Tape Encryption is properly installed, message BESnT0001I is issued for each step. If this message is not issued, encryption activity is not being performed, and further analysis is necessary.
The CA Vtape and CA Disk Options can be tested by setting their encryption parameters and performing backstore or a backup/archival to tape.
Refer to the comments in the BESIVP job for details on the customization required. As part of the installation procedure you set up the Symmetric Keys to be used at your site or accepted the default keys shipped with CA Tape Encryption. Prior to running BESIVP, set up a data class that references one of the Symmetric Keys defined in parmlib. The data class you set up must be specified in the first step of BESIVP.
Note: For information about creating the DFSMS data classes to control encryption processing, see the Administration Guide.
Check the ACS routines on the target system to insure that they permit the data class to be assigned by the JCL and do not override it with another data class. If you do not see the BESnT0001I message, check the job log to see that the expected data class was assigned.
| Copyright © 2010 CA. All rights reserved. | Tell Technical Publications how we can improve this information |