After you recover security file data, activate your new primary and backup security files.
Summary of steps:
Important! This procedure is for environments that use a non-shared security file (SHRFILE=NO). Separate instructions are available to activate the files in an environment that uses a shared security file.
Follow these steps:
Note: The new security file and backup file must be on different volumes. The new primary security file must have the same parameter values as the original security file. The ID parameter should be set to ID=PRIMARY.
Note: Skip step 2.
Your new security file is initialized.
//TSS PROC PARMS='SYS1.PARMLIB', // HL='CAI.TSSC0', // PRINT='*' //* //* //* CA Top Secret SECURITY (TSS) STARTED TASK FOR USE //* DURING RECOVERY PROCEDURE ONLY //* //* //TSSB EXEC PGM=TSSMNGR4,DPRTY=(15,14), // TIME=1440,REGION=500K //SECFILE DD DISP=SHR,DSN=&HL..BACKUP //BACKUP DD DISP=SHR,DSN=&HL..SECFILE //VSAMFILE DD DISP=SHR,DSN=&HL..VSAMCOPY (VSAMDEF7) //VSAMBKUP DD DISP=SHR,DSN=&HL..VSAMFILE (VSAMDEF3) //RECFILE DD DISP=SHR,DSN=&HL..RECFILE //AUDIT DD DISP=SHR,DSN=&HL..AUDIT //PARMFILE DD DISP=SHR,FREE=CLOSE,DSN=&PARMS(TSSPARM0). //AUTOCMDS DD DISP=SHR,FREE=CLOSE,DSN=&PARMS(TSSAUTO0). //SYSUDUMP DD SYSOUT=&PRINT. //PEND
P TSS
S TSSN, , ,REINIT
The restarted product now uses the newly created procedure.
F TSS,BACKUP
STOP TSS
S TSS
The primary security file is recovered, with the original security file and VSAM names.
TSS MODI STATUS
Active recovery file status information indicates that the RECOVER option is ON. Absence of the status information indicates that the option is OFF, in which case you can activate the option.
You have successfully recovered from the security file failure.
Security file recovery occurs in two phases:
Important! If the security file is compromised and the CA Top Secret address space stays up, ensure that your backup started task JCL is current prior to shutting down the address space.
Summary of steps:
Important! This procedure assumes you have implemented automatic backup (control option BACKUP) with command recovery (control option RECOVER(ON)). Additionally, this procedure is for environments that use a shared security file (SHRFILE=YES). A separate procedure exists to recover data for a non-shared security file.
The goal of this recovery scenario is to forward recover security files, ending up with the same data set names, enabling you to recover without changing the live TSS started task.
Follow these steps:
This information might be need by CA Support later to determine what problems occurred that caused the security file failure.
Important! If you are using your only copy of the backup security file and suspect that a command function update damaged the security file, make a copy of the backup security file by running the TSSBCKUP or SMSBCKUP procedure JCL.
Example of TSSB Started Task Procedure
//TSSB PROC PARMS='SYS1.PARMLIB', // HL='CAI.TSSC0', // PRINT='*' //* //* //* CA Top Secret SECURITY (TSS) STARTED TASK FOR USE //* DURING RECOVERY PROCEDURE ONLY //* //* //TSSB EXEC PGM=TSSMNGR4,DPRTY=(15,14), // TIME=1440,REGION=500K //SECFILE DD DISP=SHR,DSN=&HL..BACKUP //VSAMFILE DD DISP=SHR,DSN=&HL..VSAMCOPY //VSAMAIX DD DISP=SHR,DSN=&HL..AIXCOPY //VSMPATH DD DISP=SHR,DSN=&HL..PATHCOPY //RECFILE DD DISP=SHR,DSN=&HL..RECFILE //AUDIT DD DISP=SHR,DSN=&HL..AUDIT //PARMFILE DD DISP=SHR,FREE=CLOSE,DSN=&PARMS(TSSPARM0)
P TSS
S TSSB
Running TSSB ensures that you have a security file that is no more than 24 hours out of date. This should let most operations continue normally without an outage while you continue the recovery process.
F TSS,RECOVER(OFF)
S TSSRCVR1,DTE=DATE(yyddd)[,TME=TIME(hhmm)]
Specifies the hour and minute for selecting recovery records. This value should be the time of the last security file backup.
Specifies the earliest date for selecting recovery records.
TSSRCVR1 retrieves the changes.
A TSS command can contain the keyword TARGET. When placed in the recovery file on the system where it was entered, the TARGET keyword is commented out and replaced with TARGET(=). This change prevents duplicate permits on remote nodes when recovery is done on one system.
Example: Replacing the TARGET Keyword
In this example, you specify the following command:
TSS TARGET(=,NODE2) PERMIT(USER1) DSNAME(ABC.) ACCESS(READ)
In the output of TSSRCVR1, the command appears as follows:
TSS TARGET(=) PERMIT(USER1) DSN(ABC.) ACCESS(READ)
TSS ADDTO(STC) PROCNAME(TSSRCVR2) ACID(msca) STCACT
To ensure that commands do not fail due to insufficient authority, TSSRCVR2 runs under Master Security Control ACID (MSCA) authority. The optional STCACT keyword prompts the operator console for a user ID and password when the procedure is started. The ID is written to the audit file.
S TSSRCVR2
The changes that TSSRCVR1 collected are applied to the backup security file. You have recovered data.
After you recover security file data, activate your new primary and backup security files.
Summary of steps:
Important! This procedure is for environments that use a shared security file (SHRFILE=YES). Separate instructions are available to activate the files in an environment that uses a non-shared security file.
Follow these steps:
Note: The new primary security file must have the same parameter values as the original security file. The ID parameter should be set to ID=PRIMARY.
//DD1 DD DISP=SHR,DSN=IDSXV$P.PO.TSSHO43.VSAMCOPY //DD2 DD DISP=SHR,DSN=IDSXV$P.PO.TSSHO43.VSAMFILE
Note: We are using a throwaway VSAM file when we run TSSMAINS. We do this activity to satisfy a requirement in TSSMAINS so that we can continue to create a BDAM file.
Example of TSSMAINS
//TSSMAINS EXEC PGM=TSSMAINT //MAINTOUT DD SYSOUT=* //SECFILE DD DSN=Original SECFILE NAME , // SPACE=(XXXX,(XXXX),RLSE,CONTIG), // UNIT=3390,DISP=(,CATLG,DELETE),VOL=SER=XXXXXX, // DCB=(KEYLEN=17,BLKSIZE=27648) //VSAMFILE DD DISP=SHR,DSN=VSAM file from VSAMDEF6 //MAINTIN DD * CREATE SECURITY ACCESSORS=40000 VOLUMES=3000 BLOCKSIZE=27648 MAXACIDSIZE=512 RESBLOCKS=50 SCA=XXXXXXXX/ZZZZZZZZ ID=PRIMARY INITVSAM=DIGICERT /*
Note: The VSAM files that you reference in TSSN should be the files that were created when you ran VSAMDEF7 earlier in this procedure.
You can use the following JCL as an example to create TSSN:
//TSS PROC PARMS='SYS1.PARMLIB', // HL='CAI.TSSC0', // PRINT='*' //* //* //* CA Top Secret SECURITY (TSS) STARTED TASK FOR USE //* DURING RECOVERY PROCEDURE ONLY //* //* //TSSB EXEC PGM=TSSMNGR4,DPRTY=(15,14), // TIME=1440,REGION=500K //SECFILE DD DISP=SHR,DSN=&HL..BACKUP //BACKUP DD DISP=SHR,DSN=&HL..SECFILE //VSAMFILE DD DISP=SHR,DSN=&HL..VSAMFILE //VSAMAIX DD DISP=SHR,DSN=&HL..VSAMAIX //VSAMPATH DD DISP=SHR,DSN=&HL..VSAMPATH //VSAMBKUP DD DISP=SHR,DSN=&HL..VSAMBKUP //RECFILE DD DISP=SHR,DSN=&HL..RECFILE //AUDIT DD DISP=SHR,DSN=&HL..AUDIT //PARMFILE DD DISP=SHR,FREE=CLOSE,DSN=&PARMS(TSSPARM0). //AUTOCMDS DD DISP=SHR,FREE=CLOSE,DSN=&PARMS(TSSAUTO0). //SYSUDUMP DD SYSOUT=&PRINT. //PEND
P TSS
S TSSN,,,REINIT
The restarted product now uses the newly created procedure.
F TSS,BACKUP
P TSS
S TSS
The primary security file is recovered, with the original security file and VSAM names.
TSS MODI STATUS
Active recovery file status information indicates that the RECOVER option is ON. Absence of the status information indicates that the option is OFF, in which case you can activate the option.
You have successfully recovered from the security file failure.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|