Previous Topic: Managing Data Sets and Tape BackupsNext Topic: Reestablish the System after a Loss


Selecting Host System(s) for Recovery

If your environment consists of two or more CA Top Secret systems sharing the Security Data Base, you need to choose the system or systems from which you will perform Security File recovery tasks. The recovery tasks are the actual steps required to activate CA Top Secret in limited backup mode, restore any files if necessary, and reconstruct the Security File. While it may not be appropriate or necessary to implement recovery procedures for all systems sharing the same Security File, you should, at the very least, choose a system and method which can function independently, without relying heavily on other systems to complete the tasks.

For instance, your plan should not include submission of batch jobs across CPUs to an NJE system that does not accept jobs unless CA Top Secret is available. Likewise, if your implementation requires that certain tasks be performed by a guest MVS system under VM, be sure that the MVS system does function properly without relying on any special resources or privileges normally granted by CA Top Secret running on the host VM system; if it does, you should be sure that you can also recover the file using available utilities and CA Top Secret VM on the host VM system.

The remainder of this section discusses recovery implementation using a VM system and CA Top Secret VM. For further details on implementing recovery using CA Top Secret MVS or VSE, see the CA Top Secret MVS or VSE documentation.