

Converting SMU Control Statements to CA Top Secret › Terminal Based Security to CA Top Secret Conversion › SMU Terminal Security to CA Top Secret Migration
SMU Terminal Security to CA Top Secret Migration
To migrate from SMU terminal security to CA Top Secret:
- Determine whether you need to perform the conversion of the SMU terminal based security definitions. If existing CA Top Secret transaction and command security policy is sufficient, conversion of the SMU terminal security may not be necessary.
- Determine whether you want to convert the SMU terminal security definitions to a user-based CA Top Secret policy or a terminal-based (ATS) CA Top Secret policy.
- Determine the facility of the IMS region whose SMU security is being converted.
- Determine whether you want to assign resource ownership to a single ID, or use a substitution literal in the owner value of the PARM= execution parameters.
- If you are performing a terminal-based (ATS) conversion, determine the department in which the terminal ACIDs are created.
- Run the TSSCFILE utility to obtain the ownership information for IMS transactions and commands.
- Run the TSSISMU4 conversion utility program using the TSSCFILE input and the SMU statements for the IMS region being converted.
- Review the TSS command statements created by the TSSISMU4 utility for accuracy.
- If you are performing a user-based conversion, the utility generates a PERMIT statement for the IMS transactions and commands with a dummy value in the ACID initialized to the IMS logical terminal name. Determine who the users are who require access to the transaction or command, and change the ACID value in the PERMIT statement to reflect those users. If necessary, the PERMIT statement can be duplicated to permit access from different sets of users.
- Execute the TSS commands to update CA Top Secret.
- Change the SECURITY macro in the IMS system definition to turn off SMU terminal security, and to enable CA Top Secret terminal and command security.
- Run the IMS system definition.
- Change the IMS execution parameters to enable terminal and command security.
- Restart IMS
Copyright © 2013 CA Technologies.
All rights reserved.
 
|
|