Previous Topic: How List Processing WorksNext Topic: List Structure Components


List Structures

CA Top Secret uses the list structure to “hold” the Security File. With a list structure, numerous functions can be performed against the security file, for example, reads, writes, deletes, and multiple deletes.

A connection between each system in the sysplex and the structure in the coupling facility must be created to establish communication. The connection is established prior to any other function and indicates to the coupling facility which structure contains the data for future processing.

When CA Top Secret is done communicating with the structure in the coupling facility a disconnect is performed. A list structure can be redefined while systems are connected to it. A redefining of the structure can take place if, for example, it becomes full and it is necessary to increase its size.