Security file recovery occurs in two phases:
Important! If the security file is compromised and the CA Top Secret address space stays up, ensure that your backup started task JCL is current prior to shutting down the address space.
Summary of steps:
Important! This procedure assumes you have implemented automatic backup (control option BACKUP) with command recovery (control option RECOVER(ON)). Additionally, this procedure is for environments that use a non-shared security file (SHRFILE=NO); a separate procedure exists to recover data for a shared security file.
The goal of this recovery scenario is to forward recover security files, ending up with the same data set names, which enables you to recover without changing the live TSS started task.
Follow these steps:
The backup information might be needed by CA Support to determine what occurred that led to security file problems.
When running VSAMDEF7, steps 4 and 5 are skipped because we do not use AIX or PATH in a non-shared environment.
Important! If you are using your only copy of the backup security file and suspect that a command function update damaged the security file, make a copy of the backup security file by running the TSSBCKUP or SMSBCKUP procedure JCL.
Example of TSSB Started Task Procedure
//TSSB PROC PARMS='SYS1.PARMLIB', // HL='CAI.TSSC0', // PRINT='*' //* //* //* CA Top Secret SECURITY (TSS) STARTED TASK FOR USE //* DURING RECOVERY PROCEDURE ONLY //* //* //TSSB EXEC PGM=TSSMNGR4,DPRTY=(15,14), // TIME=1440,REGION=500K //SECFILE DD DISP=SHR,DSN=&HL..BACKUP //VSAMFILE DD DISP=SHR,DSN=&HL..VSAMCOPY - VSAMDEF7 //RECFILE DD DISP=SHR,DSN=&HL..RECFILE //AUDIT DD DISP=SHR,DSN=&HL..AUDIT //PARMFILE DD DISP=SHR,FREE=CLOSE,DSN=&PARMS(TSSPARM0)
P TSS
S TSSB
Running TSSB ensures that your security environment is no more than 24 hours out of date. This should let most operations continue normally without an outage while you continue the recovery process.
F TSS,RECOVER(OFF)
START TSSRCVR1,DTE=DATE(yyddd)[,TME=TIME(hhmm)]
Specifies the hour and minute for selecting recovery records. This value should be the time of the last security file backup.
Specifies the earliest date for selecting recovery records.
TSSRCVR1 retrieves the changes.
A TSS command can contain the keyword TARGET. When placed in the recovery file on the system where it was entered, the TARGET keyword is commented out and replaced with TARGET(=). This change prevents duplicate permits on remote nodes when recovery is done on one system.
Example: Replacing the TARGET Keyword
In this example, you specify the following command:
TSS TARGET(=,NODE2) PERMIT(USER1) DSNAME(ABC.) ACCESS(READ)
In the TSSRCVR1 output, the command appears as follows:
TSS TARGET(=) PERMIT(USER1) DSN(ABC.) ACCESS(READ)
TSS ADDTO(STC) PROCNAME(TSSRCVR2) ACID(msca) STCACT
To ensure that commands do not fail due to insufficient authority, TSSRCVR2 runs under Master Security Control ACID (MSCA) authority. The optional STCACT keyword prompts the operator console for a user ID and password when the procedure is started. The ID is written to the audit file.
S TSSRCVR2
The changes that TSSRCVR1 collected are applied to the backup security file. You have recovered data.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|