Previous Topic: How to Complete Configuration of the XMS Online Interfaces With CA MSM

Next Topic: Installation Steps


Define Security Requirements

Follow these steps to define security requirements for CA Top Secret Security (eTrust CA Top Secret) security:

  1. Rename the existing facility in the facility matrix table if you do not have a facility defined for RMOXMS:
    user1=NAME=RMOXMS
    
  2. Verify that the correct PGMname is defined for the new facility, where PGMname is either the first three characters or all the eight characters of the program name that is going to make security calls (EC0 or EC0DRV).
  3. Create region ACID for the facility:
    TSS CRE(rmoxms) pass(nopw,0) type(user) dept(dept)
    mastfac(rmoxms) NODSNCHK NORESCHK NOVOLCHK NOLCFCHK NOSUBCHK
    
  4. Define the RMOXMS STC to the TSS STC record:
    TSS ADDTO(STC) PROCNAME(rmoxms) ACID(rmoxms)
    
  5. Give access to the ACIDs required to sign on to this facility:
    TSS ADD(ACID) FAC(rmoxms)
    

Install the ISPF/Cross-Memory Online Retrieval Option

The ISPF/Cross-Memory Online Retrieval Option runs under IBM's ISPF for z/OS Version 3.0 and higher.

Important! This interface requires Cross-memory services to be already installed. For more information, see Install Cross-Memory Services in this chapter.

Note: In the JCL for the cross-memory services task, the parameter XMSSUB must be set to YES.