Previous Topic: Define the CIA Repository for CA DatacomNext Topic: Configure CA DSI Server for CIA Real-Time


Define the CIA Repository for DB2

Perform the following steps on the z/OS image where the CA Chorus CIA repository resides.

  1. Select the z/OS image that hosts the CA Chorus CIA repository.

    The CA Chorus CIA repository resides in a DB2 subsystem on a single z/OS image. This repository can contain the security information from multiple security databases across your enterprise. The repository is updated from any z/OS image where changes to that security database information can occur. CA Chorus accesses the security information in the CIA repository in servicing CA Chorus functionality.

    Select a z/OS image with the following so that the updating and retrieval of the CIA repository information meets your CA Chorus performance criteria:

  2. Select or define the DB2 subsystem that hosts the CA Chorus CIA repository.

    For complete information about creating and deploying a DB2 subsystem, see the appropriate IBM DB2 documentation.

  3. Define the CIA repository.
  4. Set up the Workload Manager and Resource Recovery Attach Facility environments.

    The compliance reports execute a set of CIA service functions to retrieve information from the CIA repository. The CIA user-defined functions run in a Workload Manager (WLM) environment together with the Resource Recovery Attach Facility (RRSAF).

    Operating environment setup is required for running user-defined functions and stored procedures in CIA. If you have not set up your CIA environment to use WLM-established stored procedure address spaces, see the IBM Redbook, “DB2 for z/OS Stored Procedures: Through the CALL and Beyond“ for direction on setting up WLM and RRSAF for this purpose. We recommend that you set up a separate WLM environment for the CIA service functions.

  5. Define the CIA service functions.

    Choose the following option based on your site:

    CA ACF2

    Perform the following steps to define the service functions to the target DB2 subsystem.

    CA Top Secret

  6. Before the CIA service functions can be executed, bind the application packages that correspond to the service functions in the target CIA subsystem with the security repository.

    Choose the following option based on your site:

    CA ACF2

  7. For the service functions to operate properly, link the DB2 modules, DSNRLI and DSNTIAR, into the service functions in the target DB2 subsystem with the security repository.

    Choose the following option based on your site:

    CA Top Secret