Previous Topic: Selecting Host System(s) for RecoveryNext Topic: Reconstructing the Security File


Reestablish the System after a Loss

After the security file has become unusable, you can reestablish normal operation by running the product on a backup security file.

Note: To minimize downtime, this task can be performed by data center operations personnel (after obtaining proper authorization) during off-hours.

Follow these steps:

  1. Ensure that the backup file is online and available.

    Note: Unless you need to operate by using the backup file for an extended period of time, you should activate only one CA Top Secret security system for recovery purposes in a shared security environment.

  2. Perform one of the following actions:
  3. Initialize CA Top Secret in backup mode, as follows:
    1. Ensure that the server is not logged on.

      Presumably, the server has logged itself off because of the failure. If not, use TSS MODIFY(SHUTDOWN) to deactivate security.

    2. Determine how the PASSWORDS_ON_CMD suboption AUTOLOG is set.

      You can ask your VM systems programmer how this suboption is set.

    3. Reactivate security in backup mode by entering the following command:
      XAUTOLOG server_ID
      
      server_ID

      Specifies the VM user ID of the CA Top Secret for z/VM server (typically TSSVM).

The server should now IPL normally, with the addition of the following actions upon recognizing the BACKUP keyword:

Upon successful initialization, a message appears on the VM operator's console to confirm successful backup mode initialization. If necessary, you can now re-enable system logons (if previously disabled) and attain a reasonably normal level of system operation.