BIM-ALERT/VSE provides comprehensive security for your z/vse batch environment

Size: px
Start display at page:

Download "BIM-ALERT/VSE provides comprehensive security for your z/vse batch environment"

Transcription

1 BIM-ALERT/VSE VSE External Resource Security Manager Security Administrator s Guide Release 5.1 BIM-ALERT/VSE provides comprehensive security for your z/vse batch environment BIM-ALERT/VSE allows you to control user access to datasets, programs, libraries, sublibraries, JCL keywords, ICCF pseudo partitions, and other resources without changes to JCL. Use the BIM-ALERT/VSE online, menu-driven facility to define secured resources. As each job begins execution, BIM-ALERT/VSE determines the scope of access the job is permitted. BIM-ALERT/VSE facilities include A complete monitor mode and test facility Security for job submittal from BIM-EDIT, CMS, ICCF, and other online systems Interface with many other vendors' products and other CSI products Auditing and violation log file reporting and archival utilities Advantages of using BIM-ALERT/VSE include low overhead with no penalties for operation, comprehensive z/vse resource security, security system auditability, and ease of use. BIM-ALERT/VSE is unsurpassed in operating efficiency and ease of use for non-technical auditors, security administrators, and other personnel.

2 This documentation applies to Release 5.1 of the program product BIM-ALERT. Original Printing...03/14/2000 Last Revised...12/15/2000

3 Contents Trademark Information... ix Related Publications... x Chapter 1 System Overview About BIM-ALERT What Is BIM-ALERT/VSE? BIM-ALERT/VSE Components About This Manual Chapter 2 Understanding Rules Processing Introduction About This Chapter What Resources Can BIM-ALERT Protect? How Is Security Enforced? Security Definition Introduction User Profiles Defining Resource Information Summary The Authorization Process Introduction Step 1: User Authentication Step 2: Assigns the Security ID Step 3: Checks Authorization for Controlled Library Activity Step 4: Checks If the Program Is Loaded From a Controlled Library Step 5: Checks the Action Code of the Group Rule Step 6: Checks Resource For Controlled Library Activity Step 7: Searches for an Applicable Ruleset Step 8: Searches For an Applicable Program Rule Step 9: Locates the Applicable Rule within the Ruleset Summary Sample Authorization Inquiry Extended ALXP Functions Chapter 3 Introduction to the Online Rules Definition Facility Introduction About the Online Rules Definition Facility Types of Rules Using the Online Rules Definition Facility Accessing the Online Rules Definition Facility Panels Accessed From the Online Rules Definition Facility Action Codes Equal Comparison Operators Special Node Name Status Codes Chapter 4 Creating and Maintaining User Profiles Using the User Profile Panel Contents iii

4 Introduction SECID Development Adding a User Profile Updating a User Profile Displaying a User Profile Searching for User Profiles Fields on the User Profile Panel Fields on the IUI Profile Information Panel Defining Security for Jobs from Remote Sites Introduction Security During ASI Processing Introduction Enforcing Security During ASI BIM-ALERT/VSE Submittal Monitor Defining Logon Sources Using the User Profile Panel Internally Generated User IDs Internally Generated Security IDs AXPU4 Program Introduction BIM-ALERT Authorization Call for Program AXPU Preventing AXPU4 Access by Default Chapter 5 Controlling Access to Resources About This Chapter Using the Ruleset Panels Determining the Components of the Ruleset Name Accessing Ruleset Panels Adding Rulesets Updating Rules and Rulesets DASD and Tape Dataset Panels Introduction Sample Panels Fields on the DASD and Tape Dataset Panels The Resource Information Panel Introduction Sample Panel Fields on the Resource Information Panel Accessing TAPELBL and ULTAPE Rulesets Securing ULTAPE Resources Securing DITTO Commands Securing Environment (ENVRES) Resources Securing JCL Resources Terminating Jobstreams that Violate Security Using the BIM-ALERT/VSE Security Exit for CA-XCOM How CA-XCOM Obtains the Requestor's User ID How CA-XCOM User IDs Affect BIM-ALERT Rules Accessing CA-XCOM Resource Panels Fields on the XCOMSEND and XCOMRECV Panels Examples Using the VIOLATN Resource Using the CA-FLEE Security Exit iv BIM-ALERT/VSE Security Administrator's Guide

5 Using the CA-FAVER Security Exit Using the CA-MASTERCAT Security Exit Using the BIM-FAQS/PCS Security Exit Using the CA-EXPLORE for VSE Security Exit Using the CA-EXPLORE for CICS-VSE Security Exit The Library, Sublibrary, and Library Member Panels Introduction VSE Librarian Naming Conventions How BIM-ALERT Processes Librarian Component Names Using the Library Panel Sample Library Panel Fields on the Library Panel Using the Sublibrary Panel Fields on the Sublibrary Panel Using the Library Member Panel Fields on the Library Member Panel Chapter 6 Security Administrator Control Functions Using the CALR Panel Introduction Using CALR to Put New Security Requirements into Effect Fields on the CALR panel Output from the Rules Conversion and Assembly Run Manual Generation of CALR Jobs Using the System Options Menu Introduction System Options Panels Fields on the System Options Menu Performing SCFL Control Operations Fields on the System Options Menu for Control Operations Controlling Network Submittals Controlling Monitor Mode for Dynamic Partitions Using SCFL to Control Monitor Mode for Dynamic Partitions Fields on the JECL/JCL Panel Manual Generation of SCFL Jobs Introduction Using AXPI1, AXPI3, and AXPI3E Using AXPI13 to Control Monitoring of Dynamic Partitions Using the Online Rules Test Panel Introduction Performing User Verification Performing Resource Authorization Performing a Combined Simulation Verifying Your Rules Table Simulation Response Display Fields Continuing an AXPT Session Ending an AXPT Session Changing Access Levels Using Program AXPHD Introduction AXPHD3's Process Using the HD3TAB Macro Contents v

6 Rules Test Program AXPS Introduction AXPS3 Parameters AXPS3 Jobstream AXPS3 Output Emergency Override Jobname Processing Using Emergency Override Mode Emergency Override Parameters Disabling Emergency Override Chapter 7 Batch Maintenance of the Security File Introduction Specifying Control Statements to AXPU Assigning a Description to a Logical Table Displaying Statistics Modeling a New Logical Table after an Existing One Removing a Logical Table Renaming a Logical Table Removing or Reactivating Disabled Records Modeling a SECID after an Existing SECID Removing all Rules for a SECID Changing the SECID Referred to by Rules Combining Logical Tables into a New One Chapter 8 Online Auditing Introduction About This Chapter For Information About Batch Auditing DAUD Panels Overview Audit Information Selection Criteria Panel Display BIM-ALERT Audit Information Panel Using the DLOG Transaction Introduction Display Log Records Panel Display Log File Panel Using the Print Log Records Panel Using S1U100, the Audit Trail Backup/Archive Utility Introduction Sample JCL Sample BIM-ALERT/CICS Audit Report Appendix A BIM-ALERT/VSE Extended Security Functions... A-1 Introduction... A-3 About Extended Functions... A-3 About This Appendix... A-5 SECID Rules... A-6 SECID Development... A-6 About SECID Rules... A-8 Adding SECID Rules... A-11 Displaying and Updating SECID Rules... A-14 vi BIM-ALERT/VSE Security Administrator's Guide

7 USER Rules... A-15 Introduction... A-15 Internally Generated USER IDs... A-15 Adding USER Rules... A-16 Displaying and Updating USER Rules... A-21 Sequencing USER Rules... A-22 Displaying or Changing the Sequence of USER Rules... A-23 JOBMASK Rules... A-24 Introduction... A-24 Adding JOBMASK Rules... A-25 Displaying JOBMASK Rules... A-27 Updating JOBMASK Rules... A-28 Example... A-30 Introduction... A-30 Step 1: Define the USER Rule... A-31 Step 2: Define the JOBMASK Rule... A-32 Step 3: Define the SECID Rule... A-33 Appendix B Batch Coding and Assembly of Rules... B-1 Introduction... B-2 About This Appendix... B-2 About Coding Your Own Rules... B-2 General Rules and Notation Conventions... B-3 Statements... B-8 Introduction... B-8 GROUP Statement... B-13 JOBMASK Statement... B-17 SECID Statement... B-19 DASDDS and TAPEDS Statements... B-25 LIBMEM Statement... B-29 RESOURCE Statement... B-31 SUBLIB Statement... B-35 Execution Parameters... B-37 Assembling the Rules Table... B-39 The Assembly Jobstream... B-39 AXPR1 Printer Output... B-40 Loading a New Rules Table... B-41 Procedure... B-41 Testing Before You Load... B-42 Appendix C Callable Interfaces... C-1 About This Appendix... C-2 AXP Macro... C-3 Introduction... C-3 Specifying Parameters... C-3 MF=MFGA... C-4 MF=INQ... C-4 MF=USER... C-5 MF=AUTH... C-9 Linkage Conventions for the AXP Macro... C-11 Return Values in Monitor Mode... C-12 Contents vii

8 Assembly Example... C-13 Callable Interfaces Using ID Statement Encryption... C-17 Introduction... C-17 Program AXPHJ5A... C-18 Programs AXPHJ5E and AXPHJ5F... C-21 Program AXPHJ5B... C-24 Index... 2 viii BIM-ALERT/VSE Security Administrator's Guide

9 Trademark Information This manual refers to the following brand or product names, registered trademarks, and trademarks which are listed according to their respective owners. Platinum Software: ZEKE Computer Associates International, Inc.: CA-DRIVER CA-EXPLORE for CICS CA-EXPLORE For VSE CA-EZ/KEY CA-FAVER CA-FLEE CA-LIBRARIAN CA-SCHEDULER CA-VOLLIE International Business Machines: AS400 CICS CICS/VSE IBM IDCAMS MVS/ESA VM/ESA VSE/ESA VSE/POWER VSE/SP VTAM Phoenix Software Company: CONDOR X/Open Company Ltd.: UNIX Trademark Information ix

10 Related Publications Overview This section lists the documentation that deals with BIM-ALERT/VSE and BIM- ALERT/CICS. BIM-ALERT/VSE Manuals Subject Installation Using BIM- ALERT Reports Messages Manual The BIM-ALERT Installation and Operations Guide explains how to install and maintain BIM-ALERT/VSE. The BIM-ALERT/VSE Security Administrator's Guide explains how to use BIM-ALERT/VSE to set up and maintain security. The BIM-ALERT Auditing and Report Writing Guide explains how to use the BIM-ALERT batch report writer. The BIM-ALERT Messages Guide contains explanations of all messages issued by BIM-ALERT/VSE. BIM-ALERT/CICS Manuals Subject Installation Using BIM- ALERT Reports Messages Manual The BIM-ALERT Installation and Operations Guide explains how to install BIM-ALERT/CICS. The BIM-ALERT/CICS Security Administrator's Guide explains how to use BIM-ALERT/CICS to set up and maintain security. The BIM-ALERT Auditing and Report Writing Guide explains how to use the BIM-ALERT batch report writer. The BIM-ALERT Messages Guide contains explanations of all messages issued by BIM-ALERT/CICS. x BIM-ALERT/VSE Security Administrator's Guide

11 1 System Overview This chapter describes the features of the BIM-ALERT/VSE product and its components. It also outlines compatibility issues between this version of the product and previous versions. About BIM-ALERT What Is BIM-ALERT/VSE? BIM-ALERT/VSE Components About This Manual

12 What Is BIM-ALERT/VSE? About BIM-ALERT About BIM-ALERT What Is BIM-ALERT/VSE? Description BIM-ALERT/VSE is a security product designed to control access to datasets, programs and other library members, libraries, and sublibraries in a VSE batch environment. The Security Process Using an online, menu-driven facility, the security administrator defines secured resources and the required security ID that a job must have to access specific resources. As each job begins execution, BIM-ALERT/VSE assigns it a security ID, which determines the scope of access the job is permitted. A job's security ID is usually based on the identity of the user who submitted the job. However, other JCL parameters, such as POWER password or job accounting information, can also be used to develop the security ID. You can choose which JCL items to use to develop a job's security ID. Controls BIM- ALERT Provides BIM-ALERT/VSE helps you maintain control of the batch computing environment by doing the following: Monitoring the online job SUBMIT process performed through CMS, ICCF, BIM- EDIT, and several other facilities. This helps maintain accountability for jobs entering the system. Controlling entry of jobs from remote locations. Controlling access to any program retrieved from a VSE library. This control includes access using program execution (EXEC) and LOAD and FETCH. Logging each program execution that occurs. This data can help you track unauthorized executions of programs. Controlling access to VSE libraries. This control includes full READ, WRITE, DELETE, and DEFINE protection at the library, sublibrary, and library member levels. Controlling access to any VSAM dataset. This control includes full READ, WRITE, DELETE, and DEFINE protection. Controlling access to non-vsam DASD datasets that are allocated using standard VSE data management facilities. BIM-ALERT/VSE also controls access to files allocated using DASD space management facilities, including (but not limited to) SAM-managed VSAM files. Controlling access to tape datasets. 1-2 BIM-ALERT/VSE Security Administrator's Guide

13 About BIM-ALERT What Is BIM-ALERT/VSE? Controlling access to several sensitive VSAM catalog management functions. Controlling access to functions of the VSE DITTO utility program at the command level. Controlling usage of sensitive JCL commands, such as commands to erase data stored on tape volumes. Enforcing or tracking usage of standards for JCL and JECL job statements. Chapter 1. System Overview 1-3

14 BIM-ALERT/VSE Components About BIM-ALERT BIM-ALERT/VSE Components Overview BIM-ALERT/VSE's components fall roughly into the following functional areas: Component Job Submit Monitor Facility Security Check Initiators Authorization Checking Routine Description These routines get control whenever an online facility (CMS, ICCF, BIM-EDIT, and so on) is invoked to submit a job to batch. They ensure that the identity of the user who is submitting the job is carried into the job control statements. These routines get control when a job requests access to a resource. They invoke the authorization checking routine. These tasks access a rules table to determine the following: Whether a job is authorized to access a resource At what level (read, write, or execute) a job is authorized to access a resource Online Rules Definition Facility Batch Rules Assembler System Startup Logging Rules File Management Reporting and Archiving The online rules definition facility runs as a CICS transaction. This transaction enables the security administrator to define protected resources and to define what security ID a job must have to access them. This facility includes an audit trail to keep track of all security definition activity. The rules assembler runs as a batch job. It accepts data produced by the online rules definition facility, interprets this data, and places it in a form (the rules table) that the authorization checking routine can use. The system startup routines establish BIM-ALERT/VSE's security check initiators as the VSE security interface. System startup also makes available the specific rules table designated by the security administrator. The logger runs either as a subtask in the POWER partition or standalone in its own partition. It accepts requests to write data to the log file and the operator console. These requests come primarily from the authorization checking routine. Several batch programs assist in managing the data produced by the online rules definition facility. These programs provide reporting and archiving for the log file data and the BIM-ALERT audit file. 1-4 BIM-ALERT/VSE Security Administrator's Guide

15 About BIM-ALERT BIM-ALERT/VSE Components Security Check Initiators Batch jobs gain access to resources such as datasets (files) and programs through high-level operating system interfaces. For example, access to a dataset is gained through an OPEN macro and access to a program is gained through a FETCH or LOAD macro. These operating system interfaces, as well as certain other operating system components such as the VSE Librarian, request security checks using the standard VSE security interface. Because the BIM-ALERT/VSE startup has established BIM-ALERT/VSE as the VSE security interface, BIM-ALERT/VSE's authorization checking routine is invoked automatically on any such requests for security checking. To provide security for additional resources, BIM-ALERT/VSE's security check initiators "front-end" several other points where access to a resource may be requested, and invoke the authorization checking routine. In addition, you can incorporate security checks into your own programs by using the AXP macro. This macro invokes the BIM-ALERT authorization routine and checks authorization based on rules defined by the security administrator. The macro can be useful in programs that circumvent the normal operating system services to gain access to resources and in situations in which you want to check security for resources other than those pre-defined by BIM-ALERT (libraries, datasets, and so on). For detailed information about the AXP macro, refer to Appendix C, "Callable Interfaces". Whether the check is initiated by one of BIM-ALERT's built-in security check initiators or by the AXP macro, the authorization checking routine gets control before the requestor is actually given access to the resource. BIM-ALERT/VSE can be directed to cancel a job that requests access to an unauthorized resource. Authorization Checking Routine The authorization checking routine is invoked when a job requests access to a resource. The routine that invokes the authorization checking routine provides a description of the resource. The checking routine searches the rules table for a rule that covers the resource. If the resource is covered by a rule, it indicates what security ID is required to permit access to the resource. The rule also specifies at what level a security ID is permitted access, such as read, write, or execute. If the job's security ID does not permit it to access the resource, the checking routine denies access. The authorization checking routine is also responsible for developing a job's security ID. This is done when the job begins to execute, by assembling various items of job entry data that are included in the job's JCL. A job's security ID is usually based on the identity of the submittor, which is contained in a JCL or JECL statement, or an internal VSE control block. Rules Table Definition BIM-ALERT/VSE's menu-driven online system makes it easy to define rules to the BIM- ALERT/VSE system. The online rules definition facility runs as a CICS transaction, with a main menu containing all the functions, and a series of panels used to add, display, update, or change the sequence of the different types of rules to be assembled. A VSAM database holds the rules definitions, and because you can assign a table number to each rule, multiple logical rules tables can be contained in the same physical VSAM file. Chapter 1. System Overview 1-5

16 BIM-ALERT/VSE Components About BIM-ALERT This online rules definition process establishes the parameters of the batch security environment. It defines what job entry items are used to form a job's security ID, and it defines what security ID is required to access each secured resource. An audit facility keeps track of all online security definition activity in a separate file. This file is shared by BIM-ALERT/VSE and BIM-ALERT/CICS and both types of security definitions are recorded in this file. Batch Rules Assembler The rules file conversion program runs as a batch program and produces a file suitable for input to the rules assembler program. The rules assembler program interprets this file, changes it into a form suitable to the authorization checking routine (a rules table), and finally invokes the linkage editor to place the table into a library. (You can initiate this batch process with an online transaction.) The rules table assembly process produces a table with a phase name specified by the administrator. A specific rules table may be connected to the authorization checking routine in one of two ways: At system startup, the rules table named in the BIM-ALERT/VSE control file is retrieved from a library and loaded into main storage. The startup JCL may optionally override the name specified in the control file. After the system has been started, a different rules table, previously placed in a library by the rules assembler, may be connected to the authorization checking routine. This is done by executing the startup program in the MODIFY mode, and specifying the phase name of the rules table. System Startup The system startup program establishes BIM-ALERT/VSE as the VSE security interface. It also loads the rules table. Normally the startup program is executed as part of the ASI process (that is, at IPL). The startup program is designed to accept input parameters from two sources: The BIM-ALERT/VSE control file. The security administrator places the desired startup parameter values into this file using a control file load program. Parameters not specified at that time assume default values. The control file load program executes in a batch job that you can initiate from the online facility. Control statements from the startup jobstream. The startup job is normally cataloged as part of the ASI procedure. Statements in this jobstream override values from the control file. However, the security administrator can place a parameter in the control file that specifies that overriding control statements in the jobstream are not permitted. At System Startup, specify the name of the rules table and indicate whether the system is to run in monitor mode. During initial system implementation, you can specify a parameter to direct BIM-ALERT/VSE to operate in monitor-only mode. In monitor-only mode, BIM- ALERT/VSE monitors jobs entering the system and tracks access to resources, but does not deny access to any resource or cancel any job. 1-6 BIM-ALERT/VSE Security Administrator's Guide

17 About BIM-ALERT BIM-ALERT/VSE Components Logging The logger can run as a subtask in the same partition as POWER or in a dedicated partition or in any partition capable of attaching a subtask. It accepts requests for logging and writes records to a VSAM file. The logger is also responsible for writing messages to the operator console. Tasks requesting logging (primarily the authorization checking routine) place log data in a log queue, which is defined in the system GETVIS area. If you run the logger in a POWER partition, the logger starts when the POWER partition is started. The logger generally starts during the ASI process, that is, at IPL. If the logger startup is executed before the BIM-ALERT/VSE system startup program, however, the logger waits until the BIM-ALERT/VSE system startup program has finished before it begins its initialization procedure. The logger automatically enters an IDLE state when BIM-ALERT/VSE is shut down. It also terminates whenever the POWER partition terminates, that is, when a PEND is issued. If you run the logger in a dedicated partition, the logger runs as a batch job in that partition and starts when the jobstream starts. To stop the logger, you must execute a batch utility to force an end-of-job. Rules File Management Several batch utilities help manage and report on the file maintained by the online rules definition facility. Some of the utilities are mandatory in order to use the online system, while others are optional utilities designed to report upon the file, or to assist in making mass changes to the file. The following utilities are provided: Utility AXPU001 AXPU002 AXPU004 Description Runs after the file has been defined using IDCAMS. AXPU001 adds records to the file which will be used by the online system for control information when new rules are added. This program must be run before using the online system. Converts the online rules file to a format readable by the rules assembler. Any time a change is made to the online file, the rules must be reassembled before the change can influence the security environment. AXPU002 must be run to convert the online file before the new changes can be assembled into the rules. Performs mass maintenance to the online file. You can perform the following operations with AXPU004: Assign a description to a logical table Display statistical information about the entire file Model a new logical table after an existing one Remove a logical table Rename a logical table Remove disabled records from a logical table Reactivate disabled records in a logical table Model a SECID after an existing SECID within a logical table Remove all rules for a SECID from a logical table Combine logical tables into a new logical table Chapter 1. System Overview 1-7

18 BIM-ALERT/VSE Components About BIM-ALERT AXPB001 Produces a listing of all the resources a security ID can access in a particular table. It is a reporting facility only, and it is optional. Reporting and Archiving BIM-ALERT/VSE includes an online transaction for viewing the log file data and a batch program to produce printed reports from the log file data. The batch program accepts input from either the current log file data (on disk) or an archive tape. You can also direct it to merge the current log file data with a "to date" archive tape. A batch report program and an online transaction are provided to display the data in the BIM-ALERT audit file. 1-8 BIM-ALERT/VSE Security Administrator's Guide

19 About This Manual About This Manual Organization The following table shows where to find information in this manual: For Information About The resources BIM-ALERT can protect and how security is defined and enforced. Using the online rules definition facility. Using the User Profile panel to create, display, and change user profiles. User profiles define the security ID to be assigned to users based on their individual logon information. Refer To Chapter 2, "Understanding Rules Processing" Chapter 3, "Introduction to the Online Rules Definition Facility" Chapter 4, "Creating and Maintaining User Profiles" The BIM-ALERT/VSE submittal monitor. The AXPU4 program. Controlling access to DASD and tape datasets; libraries, sublibraries, and library members; and to other resources such as ULTAPE resources and DITTO commands. Chapter 5, "Controlling Access to Resources" Using the security exits. Using the CALR, SCFL, and AXPT panels to perform security administrator control functions, such as putting new security into effect, reloading the control file, and performing simulations to test your rules. Chapter 6, "Security Administrator Control Functions" Emergency override jobname processing. Rules test program AXPS3. Batch maintenance of the security file. Online auditing facilities. Extended security functions, which provide an alternate method for SECID development to cover situations where using the submittor's identity is not appropriate. Chapter 7, "Batch Maintenance of the Security File" Chapter 8, "Online Auditing" Appendix A, "BIM-ALERT/VSE Extended Security Functions" (continued) Chapter 1. System Overview 1-9

20 About This Manual For Information About How to create and assemble rules without using the online rules definition facility. How to use the following: The AXP macro to perform an authorization check for pre-defined and user-defined resources. Refer To Appendix B, "Batch Coding and Assembly of Rules" Appendix C, "Callable Interfaces" Programs AXPHJ5A, AXPHJ5E, AXPHJ5F, and AXPHJ5B to secure submittal processes not covered by a submittal monitor BIM-ALERT/VSE Security Administrator's Guide

21 2 Understanding Rules Processing This chapter describes rule processing for BIM-ALERT/VSE and is directed toward the security administrator. Introduction About This Chapter What Resources Can BIM-ALERT Protect? How Is Security Enforced? Security Definition Introduction User Profiles Defining Resource Information Summary The Authorization Process Introduction Step 1: User Authentication Step 2: Assigns the Security ID Step 3: Checks Authorization for Controlled Library Activity Step 4: Checks If the Program Is Loaded From a Controlled Library Step 5: Checks the Action Code of the Group Rule Step 6: Checks Resource For Controlled Library Activity Step 7: Searches for an Applicable Ruleset Step 8: Searches For an Applicable Program Rule Step 9: Locates the Applicable Rule within the Ruleset Summary Sample Authorization Inquiry

22 2-2 BIM-ALERT/VSE Security Administrator's Guide Extended ALXP Functions

23 Introduction About This Chapter Introduction About This Chapter This chapter describes rule processing for BIM-ALERT/VSE and is directed toward the security administrator. Familiarity with basic VSE concepts (such as libraries, sublibraries, datasets, and job processing) is required, but no detailed knowledge of programming, VSE internals or VSE JCL is required. Chapter 2. Understanding Rules Processing 2-3

24 What Resources Can BIM-ALERT Protect? Introduction What Resources Can BIM-ALERT Protect? BIM-ALERT/VSE provides security for VSE resources that are accessed by batch jobs. These resources include VSE datasets, libraries, sublibraries, and library members (including executable programs). BIM-ALERT/VSE does not provide security for online processes such as CICS and ICCF. The following types of control are provided: You Can Control Job execution Access to datasets Access to VSE libraries, sublibraries, and library members VSAM catalog functions JCL commands DITTO commands CA-XCOM resources Description You can control which users can execute batch jobs. In this context, a user is someone who can be identified by an online user ID, such as a CMS user ID or an ICCF user ID or by a user ID and password from a // ID job control statement or a VSE POWER job card. You can control which users' jobs can access specific datasets at specific levels: read, update, and alter. Included here are tape datasets, disk datasets controlled by VSAM, and disk datasets controlled by VSE LIOCS. (Alter access applies only to datasets controlled by VSAM.) You can control which users' jobs can access specific VSE libraries, sublibraries, and library members. This control can be applied at specific levels: execute, read, update, and alter. You can control which users' jobs can perform the following operations: Delete and define VSAM catalogs Delete and define VSAM space Obtain a listing of all the information in a VSAM catalog You can control which users' jobs can execute certain sensitive JCL commands. You can control which users' jobs can execute DITTO commands. You can control send and receive requests from CA s XCOM product. 2-4 BIM-ALERT/VSE Security Administrator's Guide

25 Introduction How Is Security Enforced? How Is Security Enforced? Overview BIM-ALERT/VSE consists of the following components: Security definition Authorization Logging and reporting A description of each of these components follows. Security Definition The security definition component consists of a CICS transaction (ALXP) and several batch programs. With ALXP, you can define your security requirements online. The batch programs transform your security requirements into a format that is suitable for the authorization component. Authorization The authorization component enforces the security requirements that you define. Resource authorization requests come from VSE components (such as the librarian) and from BIM- ALERT/VSE modules that "hook" strategic VSE processes (such as the VSAM delete and define process). Also included in the authorization component are the job submittal monitors. Those modules monitor job submittal processes in various online environments (such as CMS, CICS, and ICCF). The job submittal monitors put information in the jobstream that identifies the submittor. Logging and Reporting The logging and reporting component keeps track of violations and auditing information in disk files, and it produces messages on the operator console when a violation occurs. It includes report programs that produce printed output from either the audit file or the log file data, and online transactions that display information from either the audit file or the log file. Chapter 2. Understanding Rules Processing 2-5

26 Introduction Security Definition Security Definition Introduction How Is Security Definition Information Entered? You use the ALXP transaction to enter information that is used by the authorization component to enforce your security requirements. This section describes the individual elements of that information, and shows how those elements fit together. Where Is Security Definition Information Stored? ALXP stores your security information in a VSAM file known as the online security definition file. Batch programs transform the information in the online security definition file into another format and catalog it into a VSE library member. That VSE library member is called a rules table. The authorization component retrieves your security information from the rules table, not directly from the online security definition file. The rules table includes two types of information: User profile Resource information Both types of rules table information are described in the following sections. 2-6 BIM-ALERT/VSE Security Administrator's Guide

27 Security Definition User Profiles User Profiles Introduction User information identifies users who submit jobstreams to batch partitions. The authorization component uses this information to assign a security ID (SECID) to a jobstream. All the information for one user is known collectively as a user profile. A user profile consists of the following types of information, each of which is discussed below: Descriptive information An action code A security ID (SECID) Logon identification An expiration date Descriptive Information You can associate descriptive data with each user through fields on the User Profile panel. The descriptive data, such as user name and department, has no direct impact on security enforcement (it is not even present in the rules table), but it is shown whenever you use ALXP to display a user profile. For a complete list of fields on the User Profile panel, see page Action Codes You can associate one of the following action codes with each user profile: Code Actions Taken * Allow access without any special logging or console display. L Allow access Write a record into the BIM-ALERT/VSE log file W C Allow access Display a message on the system operator's console Write a record into the BIM-ALERT/VSE log file Deny access. Refer to page 2-7 for more information. Whenever BIM-ALERT/VSE processes a jobstream, it retrieves the action code from the submittor's user profile and performs the specified actions. Security ID The security ID is a one- to eight-character name designated for an individual user or a group of users with similar security authorization. Each user profile specifies the security ID for that user. Any job submitted by the user is assigned that security ID. When you define security for a resource, you identify authorized users of that resource by security ID, not by individual user. Chapter 2. Understanding Rules Processing 2-7

28 User Profiles Security Definition Logon Identification The user profile contains the following two types of logon identification information: One type describes information for jobs submitted from a process that already validated the user. That information and the logon ID form the basis for assigning a SECID to the jobstream. The other type of logon identification information is for jobs that are not submitted from an online session or that are submitted from a type of online session not supported by one of BIM-ALERT's submittal monitors. This type of information is referred to as EXT (external) on the User Profile panel, and it consists of two items: A user ID, which corresponds to the USERID parameter in a // ID statement or JECL SEC parameter in the jobstream A password, which describes a password value that BIM-ALERT compares against the PWD parameter of the // ID statement or JECL SEC parameter When you submit a jobstream using a process that is not monitored by BIM-ALERT, you place a // ID statement or JECL SEC parameter in the jobstream. The // ID statement or JECL SEC parameter contains a USERID and PWD to identify you to BIM-ALERT as the submittor of the jobstream. That information forms the basis for assigning a SECID to the jobstream. A user profile describes a single user, but it can include several logon ID/logon source entries and an EXT/PW entry. Whenever a user has more than one logon ID or EXT/PW, the user profile consists of multiple logon ID/logon source entries. Expire Date The expire date defines when the user profile expires. After that date, jobs submitted by the user are not permitted to run. Group Rules So far, this discussion of user profile information has focused on the external view, the one you see when you display a user profile with the ALXP transaction. Internally, the user profile information is represented a little differently. Each logon ID/logon source entry contains the action code, the expire date, and the security ID from the user profile. Each of these internal entries (logon ID, logon source, action code, expire date, and security ID) is known as a group rule. Each entry defines the group (security ID) that the associated logon ID/logon source belongs to. The authorization component searches these group rules to determine what security ID to assign to a jobstream. This process is described on page BIM-ALERT/VSE Security Administrator's Guide

29 Security Definition User Profiles Sample User Profile Panel DAUP ** BIM-ALERT USER PROFILE ** DISPLAY USERID NAME MODEL UP-STAT _ ADMIN USER CLASS _ CICS _ BATCH _ DATA / BATCH >>>>>>>>> PWS _ REM _ ACT _ MON _ CON _ CLB _ EXPIRE DATE / / SUBMIT USERIDS: EXT/PW / TABLES/SECIDS: CICS >>>>>>>>>> OPID IUI ID/PW / EXT SEC / PASSWORD PRM _ TRM GRP 1 COMP STATUS _ ISSUE DATE / / PRIM/GRP2 DIV PROC TYPE _ NEW PSWD ALT1/GRP3 DEPT MSG SUFFIX EFF DATE / / ALT2/GRP4 SECT INACTIVE HRS MINS..SCHED TIMES.. MON / TUE / WED / THU / FRI / SAT / SUN /...TEMP TIMES.....EFF DATE......EXP DATE... MON / / / / / TUE / / / / / WED / / / / / THU / / / / / FRI / / / / / SAT / / / / / SUN / / / / / GK714 ENTER OPERATOR TO BE DISPLAYED (OR) PRESS -PF8- TO BROWSE For More Information For detailed information about using the User Profile panel, see Chapter 4, "Creating and Maintaining User Profiles". Chapter 2. Understanding Rules Processing 2-9

30 Defining Resource Information Security Definition Defining Resource Information Introduction The second type of information in the rules table is resource information, which identifies protected resources and specifies the security IDs or authorized programs that can access each resource. Resource Classes When you enter resource information with ALXP, you assign it to a resource class. A resource class describes a category of similar types of resources. BIM-ALERT/VSE uses a one- to eight-character resource name to identify each resource class. The following are predefined resource class names: Resource Class Name CATALOG DASDDS DITTO ENVRES JCxxxxxx LIBMEM LIBRARY SUBLIB TAPEDS TAPELBL ULTAPE XCOMRECV XCOMSEND Resource VSAM catalog manipulation DASD datasets DITTO utility CPUID and partition ID JCL commands VSE library members VSE libraries VSE sublibraries Tape datasets Unlabeled and non-standard-labeled tapes Special tape operations CA-XCOM receive requests CA-XCOM send requests (continued) 2-10 BIM-ALERT/VSE Security Administrator's Guide

31 Security Definition Defining Resource Information ALXP provides a separate panel for each predefined resource class. It also provides an OTHER panel, where you can define other resources. By assigning resources to classes, BIM-ALERT/VSE can deal with duplicate resource names. Consider the name DITTO. DITTO can be the name of an executable program, the name of a VSE library, and the name of a dataset. Because BIM-ALERT/VSE allows the resource name DITTO to be assigned to a resource class, you can define separate security for LIBMEM:DITTO, LIBRARY:DITTO, and DASDDS:DITTO. This manual uses the notation just shown, class:name, to refer to a specific item of resource information. It uses the term resource to mean a resource name within a specific resource class. Elements of Resource Information Each item of resource information consists of the following: A name specification A list of security ID and authorized program entries, each with an access level and an action code A security ID or program entry, with its associated access level and action code, is known as a rule. A rule does not stand on its own; it has meaning only in connection with a resource name specification. A name specification and all the rules associated with it are referred to collectively as a ruleset. Ruleset Name Specification A ruleset's name specification defines the resources to which you want the individual rules within the ruleset to apply. You can define generic rulesets and specific rulesets. A generic ruleset's name specification includes the special masking characters equal-sign (=) and asterisk (*). It applies to an entire group of resources that have similar names. These generic characters are explained on page For library, sublibrary, library member, and dataset resources, you can also use the reserved node name +USERID to define ruleset names that apply only when the name of the resource matches the requesting user ID, as explained on page A specific ruleset applies only to a single resource. In the following example, the first line is a generic ruleset that applies to all datasets whose names start with the characters PAYROLL. The second line is a specific ruleset that applies only to the single dataset named PAYROLL.EXECUTIV.MASTER. DASDDS:PAYROLL.= (generic) DASDDS:PAYROLL.EXECUTIV.MASTER (specific) Action Code You can associate an action code with each rule within a ruleset. The codes are the same as those described for user profiles on page 2-7. Chapter 2. Understanding Rules Processing 2-11

32 Defining Resource Information Security Definition Access Levels Each rule has an access level that designates the type of operations covered by the rule. The following table shows the valid access levels from lowest to highest. When a rule covers a given access level, it also covers the lower levels. Access Level Function Levels Covered EXECUTE Executing a program EXECUTE READ UPDATE ALTER Retrieving records from a dataset Retrieving members from a sublibrary Modifying records in a dataset Adding or replacing members in a sublibrary Defining or deleting the following: Datasets Libraries Library members Sublibraries EXECUTE READ EXECUTE READ UPDATE EXECUTE READ UPDATE ALTER Although a rule covers all levels below the specified access level, you can allow one specific level of access and deny the lower levels by defining several rules. For an example that allows a security ID one level of access and denies it the lower levels, see page Sample Panel The following sample DASD Dataset Information panel illustrates most of the resource information described here. In this example, jobs from SYSPROG can delete and define PAYROLL.= datasets, but cannot read or update them. Jobs from PROD can read and update those datasets, but cannot delete and define them. DDDS ** BIM-ALERT/VSE DASD Dataset Information ** Display Table Number: 51 Dataset Name: PAYROLL.= VOLSER: SECID/PGM Access Level Action Comments Status RD UPD ALT PROD _ X _ * PRODUCTION JOBS - READ/UPDATE A SYSPROG _ X _ C SYSPROG - NOT READ/UPDATE A SYSPROG X * SYSPROG - DELETE/DEFINE A 2-12 BIM-ALERT/VSE Security Administrator's Guide

33 Security Definition Summary Summary The security information that you define with ALXP (the online transaction) consists of user information and resource information. Information for an individual user, called a user profile, lists all of the user's logon IDs and assigns the user a security ID. The user profile lets BIM-ALERT/VSE associate a security ID with the jobs that a user submits. (Several users normally share a security ID.) Resource information identifies protected resources and specifies the security IDs that can access each one. Resource information is assigned to classes of similar types of resources (such as LIBMEM and LIBRARY). Resource information is organized into rulesets. A ruleset consists of a name specification and a list of rules. A ruleset's name specification defines the resources to which the ruleset applies. Each rule consists of a security ID or an authorized program, an access level, and an action code. The rules within a ruleset determine the security IDs that can access the resources to which the ruleset applies. All the rulesets are known collectively as a rules table. Chapter 2. Understanding Rules Processing 2-13

34 Introduction The Authorization Process The Authorization Process Introduction About This Section This section explains how BIM-ALERT/VSE's authorization routine uses your rules table to determine whether a job can access resources. The authorization routine gains control either from an operating system routine (such as program FETCH or file OPEN) or from one of BIM-ALERT/VSE's "hook" routines. The authorization routine is invoked to determine whether a job can access the resources that it requests. This process of invoking the BIM-ALERT/VSE authorization routine is called an authorization inquiry in the following discussion. Monitor Mode The authorization process described in this section is affected by the monitor mode options. When monitor mode is applied to an access authorization request, the authorization process does not cancel jobs that request access to resources they are not authorized to use, but merely logs or monitors such requests. You can specify monitor mode for one or more individual rules, for a user, for an entire partition, or for the entire system. For example, when you first implement BIM-ALERT, you might want to test the rules you have created by having BIM-ALERT keep a log of which jobs your rules would allow and which jobs they would cancel, without actually denying access to any resource or canceling any job. In this case, you would specify monitor mode for the entire system. On the other hand, you might be generally satisfied with the rules you have created, but want to temporarily give a particular operator or group of operators more access to certain resources. In that case, you could specify monitor mode for a particular rule, thereby allowing the operators the increased access but tracking which resources they use. Using Monitor Mode To specify monitor mode for a particular rule, enter the status code M in the STATUS field on the appropriate panel, as described in Chapter 5, "Controlling Access to Resources". For example, to specify monitor mode for a dataset rule, use the STATUS field on the DASD Dataset Information panel. To specify monitor mode for a user profile, enter the status code M in the STATUS field on the User Profile panel, as described in Chapter 4, "Creating and Maintaining User Profiles". To put one or more partitions into monitor mode, use the MONITOR parameters of the System Options menu, as described on page BIM-ALERT/VSE Security Administrator's Guide

35 The Authorization Process Introduction Overview of the Authorization Process The issuer of the authorization inquiry provides BIM-ALERT/VSE with the following information about the requested resource: Resource class Resource name Level of access desired Using this information and the rules table, the authorization routine proceeds as follows: Step Authorization Routine's Action 1 Performs user authentication. 2 Assigns the job a security ID. 3 Checks whether the submittor is authorized for controlled library activity. 4 For each program executed within a job, checks whether the program is loaded from a controlled library. 5 Checks the action code of the group rule. If it is C, the job is canceled. Otherwise, the job continues; proceed to step 6. 6 Determines whether the requested resource is related to deleting or defining an object in a controlled library. If so, does one of the following: If the submittor is authorized for these controlled library operations, proceeds to step 7. If the submittor is not authorized for these controlled library operations, denies access to the requested resource. 7 Searches the rulesets that apply to the requested resource class for a ruleset that applies to the requested resource name. Does one of the following: If a ruleset is found, proceeds to step 8. If no ruleset applies to the requested resource, it is considered to be unprotected. Access is allowed. (continued) Chapter 2. Understanding Rules Processing 2-15

BIM-ALERT/VSE VSE SECURITY SYSTEM SECURITY ADMINISTRATOR'S GUIDE. Release 5.0 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.)

BIM-ALERT/VSE VSE SECURITY SYSTEM SECURITY ADMINISTRATOR'S GUIDE. Release 5.0 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.) BIM-ALERT/VSE VSE SECURITY SYSTEM SECURITY ADMINISTRATOR'S GUIDE Release 5.0 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.) BIM-ALERT is a proprietary product of B I Moyle Associates, Inc. It cannot be reproduced,

More information

BIM-ALERT CICS AND VSE SECURITY SYSTEM INSTALLATION AND OPERATIONS GUIDE. Release 5.0 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.)

BIM-ALERT CICS AND VSE SECURITY SYSTEM INSTALLATION AND OPERATIONS GUIDE. Release 5.0 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.) BIM-ALERT CICS AND VSE SECURITY SYSTEM INSTALLATION AND OPERATIONS GUIDE Release 5.0 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.) BIM-ALERT is a proprietary product of B I Moyle Associates, Inc. It cannot

More information

BIM-ALERT/VSE BIM-ALERT/CICS Read Before Installing. Release 5.1A. April 30, 2001

BIM-ALERT/VSE BIM-ALERT/CICS Read Before Installing. Release 5.1A. April 30, 2001 Read Before Installing Release 5.1A April 30, 2001 Thank you for choosing BIM-ALERT for your security needs. The BIM-ALERT 5.1 release supports VSE/ESA 2.3, 2.4, and 2.5 running CICS/VSE 2.3 and CICS/TS

More information

IBM. Documentation. IBM Sterling Connect:Direct Process Language. Version 5.3

IBM. Documentation. IBM Sterling Connect:Direct Process Language. Version 5.3 IBM Sterling Connect:Direct Process Language IBM Documentation Version 5.3 IBM Sterling Connect:Direct Process Language IBM Documentation Version 5.3 This edition applies to Version 5 Release 3 of IBM

More information

Data Center Management Systems

Data Center Management Systems Data Center Management Systems The Expert JCL Manager - JED The Future of Automated JCL Management JED Highlights:(Partial list) The JED Process Operating Environments Supported JED Features and Functions

More information

AllFusion CA-Vollie. Systems Programmer Guide 5.0 VSE F E

AllFusion CA-Vollie. Systems Programmer Guide 5.0 VSE F E AllFusion CA-Vollie Systems Programmer Guide 5.0 VSE F15805 1E This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user's informational

More information

CA EPIC for z/vse. Release Notes. r5.2

CA EPIC for z/vse. Release Notes. r5.2 CA EPIC for z/vse Release Notes r5.2 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

CA Top Secret and CA ACF2 101

CA Top Secret and CA ACF2 101 CA Top Secret and CA ACF2 101 Reg Harbeck CA Wednesday, August 15, 2007 Session 1784 Agenda External Security CA Top Secret (TSS) CA ACF2 (ACF2) How to learn more Q & A 2 Data Security Protection of resources

More information

Contents. Why You Should Read This Manual...ix. 1. Introduction... 1

Contents. Why You Should Read This Manual...ix. 1. Introduction... 1 Contents Why You Should Read This Manual...ix 1. Introduction... 1 Understanding Security... 2 Group and User Accounts... 2 Application Features... 3 Security Areas... 3 Using Windows Security... 7 Synchronizing

More information

CA Software Change Manager for Mainframe

CA Software Change Manager for Mainframe CA Software Change Manager for Mainframe Reports Guide r12 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational

More information

CSI-QCOPY The VM/POWER Report Utility

CSI-QCOPY The VM/POWER Report Utility The VM/POWER Report Utility Installation and Operations Guide Release 1.4 CSI-QCOPY CSI-QCOPY is a comprehensive report utility that can be used in almost limitless ways. A powerful yet simpleto-use set

More information

IBM. User s Guide. NetView File Transfer Program Version 2 for MVS. Release 2.1 SH

IBM. User s Guide. NetView File Transfer Program Version 2 for MVS. Release 2.1 SH NetView File Transfer Program Version 2 for MVS IBM User s Guide Release 2.1 SH12-5656-04 NetView File Transfer Program Version 2 for MVS IBM User s Guide Release 2.1 SH12-5656-04 Note! Before using this

More information

How is a Virtual Disk like any other disk? After establishing a VDISK (Billy will discuss this in detail)... The data space can be accessed just as th

How is a Virtual Disk like any other disk? After establishing a VDISK (Billy will discuss this in detail)... The data space can be accessed just as th Virtual Disks Why Should I Care? Dan Janda The Swami of VSAM The Swami of VSE/VSAM Dan Janda VSE, VSAM and CICS Performance Consultant RR 2 Box 49E Hamlin Road Montrose, PA 18801-9624 (570) 934-2862 theswami@epix.net

More information

Version 9 Release 1. IBM InfoSphere Guardium S-TAP for IMS on z/os V9.1 User's Guide IBM

Version 9 Release 1. IBM InfoSphere Guardium S-TAP for IMS on z/os V9.1 User's Guide IBM Version 9 Release 1 IBM InfoSphere Guardium S-TAP for IMS on z/os V9.1 User's Guide IBM ii IBM InfoSphere Guardium S-TAP for IMS on z/os V9.1 User's Guide Contents Chapter 1. What does IBM InfoSphere Guardium

More information

VSAM Management. Overview. CSI International 8120 State Route 138 Williamsport, OH

VSAM Management. Overview. CSI International 8120 State Route 138 Williamsport, OH VSAM Management Overview CSI International 8120 State Route 138 Williamsport, OH 43164-9767 http://www.csi-international.com (800) 795-4914 - USA (740) 420-5400 - Main Operator (740) 333-7335 - Facsimile

More information

BIM-FAQS (ASO & PCS)

BIM-FAQS (ASO & PCS) BIM-FAQS (ASO & PCS) AUTOMATED OPERATIONS INSTALLATION AND INITIALIZATION GUIDE Release 5.2 (COPYRIGHT 2000, B I MOYLE ASSOCIATES, INC.) BIM-FAQS is a proprietary product of B I Moyle Associates, Inc.

More information

Enclosed herewith is a BIM-FAQS/ASO Release 5.2B tape and manuals. The following changes have been made for release 5.2B:

Enclosed herewith is a BIM-FAQS/ASO Release 5.2B tape and manuals. The following changes have been made for release 5.2B: January 21, 2002 BIM-FAQS/ASO 5.2B Release Enclosed herewith is a BIM-FAQS/ASO Release 5.2B tape and manuals. The following changes have been made for release 5.2B:! Support for the new SCREEN command,

More information

Compute (Bridgend) Ltd

Compute (Bridgend) Ltd Compute (Bridgend) Ltd SELCOPY 2.02 New Features for IBM Mainframe z/os, VSE & VM/CMS Systems 8 Merthyr Mawr Road, Bridgend, Wales UK CF31 3NH Tel: +44 (1656) 65 2222 Fax: +44 (1656) 65 2227 CBL Web Site

More information

z/os CSI International 8120 State Route 138 Williamsport, OH

z/os CSI International 8120 State Route 138 Williamsport, OH z/os Software Solutions CSI International 8120 State Route 138 Williamsport, OH 43164-9767 http://www.csi-international.com (800) 795-4914 - USA (740) 420-5400 - Main Operator (740) 333-7335 - Facsimile

More information

BIM-PC/TRANSFER HOST TO PC FILE TRANSFER UTILITY INSTALLATION AND OPERATIONS GUIDE. Release 1.7 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.

BIM-PC/TRANSFER HOST TO PC FILE TRANSFER UTILITY INSTALLATION AND OPERATIONS GUIDE. Release 1.7 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC. HOST TO PC FILE TRANSFER UTILITY INSTALLATION AND OPERATIONS GUIDE Release 1.7 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.) BIM-PC/TRANSFER is a proprietary product of B I Moyle Associates, Inc. It cannot

More information

Db2 Query Management Facility Version 12 Release 2. Installing and Managing Db2 QMF for TSO and CICS IBM GC

Db2 Query Management Facility Version 12 Release 2. Installing and Managing Db2 QMF for TSO and CICS IBM GC Db2 Query Management Facility Version 12 Release 2 Installing and Managing Db2 QMF for TSO and CICS IBM GC27-8877-02 Db2 Query Management Facility Version 12 Release 2 Installing and Managing Db2 QMF

More information

Perf-Method-06.PRZ The Swami's Performance Methodology Ideas Dan Janda The Swami of VSAM The Swami of VSE/VSAM Dan Janda VSE, VSAM and CICS Performanc

Perf-Method-06.PRZ The Swami's Performance Methodology Ideas Dan Janda The Swami of VSAM The Swami of VSE/VSAM Dan Janda VSE, VSAM and CICS Performanc The Swami's Performance Methodology Ideas Dan Janda The Swami of VSAM The Swami of VSE/VSAM Dan Janda VSE, VSAM and CICS Performance Consultant RR 2 Box 49E Hamlin Road Montrose, PA 18801-9624 World Alliance

More information

CA Dynam /T Tape Management for z/vse

CA Dynam /T Tape Management for z/vse PRODUCT SHEET CA Dynam/T Tape Management for z/vse CA Dynam /T Tape Management for z/vse CA Dynam /T Tape Management for z/vse (CA Dynam/T) is a tape library management solution providing a single point

More information

The Master Console Center (MCC) automates and enhances data center operations by:

The Master Console Center (MCC) automates and enhances data center operations by: Introduction The Master Console Center () automates and enhances data center operations by: Providing a high degree of operational consolidation, allowing multiple data centers and/or hosts to be monitored

More information

CA-MetaCOBOL + Online Programming Language Guide. Release 1.1 R203M+11DRP

CA-MetaCOBOL + Online Programming Language Guide. Release 1.1 R203M+11DRP CA-MetaCOBOL + Online Programming Language Guide Release 1.1 R203M+11DRP -- PROPRIETARY AND CONFIDENTIAL INFORMATION -- This material contains, and is part of a computer software program which is, proprietary

More information

IBM. Candle OMEGAMON Platform. Configuring IBM Tivoli Candle Management Server on z/os. Tivoli. Version 360 GC

IBM. Candle OMEGAMON Platform. Configuring IBM Tivoli Candle Management Server on z/os. Tivoli. Version 360 GC Tivoli Candle OMEGAMON Platform IBM Version 360 Configuring IBM Tivoli Candle Management Server on z/os GC32-9414-02 12 1 2 Tivoli Candle OMEGAMON Platform IBM Version 360 Configuring IBM Tivoli Candle

More information

Expedite/CICS Messages

Expedite/CICS Messages GXS EDI Services Expedite/CICS Messages Version 4 Release 5 GC34-2331-04 Fifth Edition (November 2005) This edition replaces document number GC34-2331-03. Copyright GXS, Inc. 1998, 2005. All rights reserved.

More information

JCL Syntax Running a Simple Job

JCL Syntax Running a Simple Job JCL Statements Lesson 2: JCL consists of eight basic statements which serve specific functions. The following JCL statements will be used: JOB The job statement defines a job and provides information about

More information

The Web Version of this chapter is split into 4 pages - this is page 2 - page contents are as follows:

The Web Version of this chapter is split into 4 pages - this is page 2 - page contents are as follows: http://wwwmvsbookfsnetcouk/chap03bhtm 1 of 6 11/2/2001 1:47 PM MVS Systems Programming Home Chapter 3b - MVS Internals Contents The Web Version of this chapter is split into 4 pages - this is page 2 -

More information

CA MICS Resource Management

CA MICS Resource Management CA MICS Resource Management MICF User Guide Release 12.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Customizing and Developing Applications with Expedite CICS

Customizing and Developing Applications with Expedite CICS GXS EDI Services Customizing and Developing Applications with Expedite CICS Version 4 Release 5 Seventh Edition (November 2005) This document (GC34-3304-06) contains revisions for MVS only. VSE users should

More information

Reliant for VSE CSI-RECOV

Reliant for VSE CSI-RECOV Reliant for VSE CSI-RECOV CICS VSAM RECOVERY INSTALLATION AND OPERATIONS GUIDE Release 4.0 (COPYRIGHT 2003, CSI INTERNATIONAL, INC.) CSI-RECOV is a proprietary product of CSI International, Inc. It cannot

More information

IBM. DFSMS Using the Interactive Storage Management Facility. z/os. Version 2 Release 3 SC

IBM. DFSMS Using the Interactive Storage Management Facility. z/os. Version 2 Release 3 SC z/os IBM DFSMS Using the Interactive Storage Management Facility Version 2 Release 3 SC23-656-30 Note Before using this information and the product it supports, read the information in Notices on page

More information

MODIFY FILE. The MODIFY FILE command enables you to change the characteristics of a previously defined entry in the file system.

MODIFY FILE. The MODIFY FILE command enables you to change the characteristics of a previously defined entry in the file system. MODIFY FILE The MODIFY FILE command enables you to change the characteristics of a previously defined entry in the file system. Syntax: MODify FILE PUBlic=pubname [,TYPe={ESDS KSDS SAM LIBrary ICCF POWer

More information

Chapter 2 Operating-System Structures

Chapter 2 Operating-System Structures This chapter will discuss the following concepts: 2.1 Operating System Services 2.2 User Operating System Interface 2.3 System Calls 2.4 System Programs 2.5 Operating System Design and Implementation 2.6

More information

SAFENET/400 FOR THE IBM SYSTEM i5 IMPLEMENTATION GUIDE Version MP Associates of Westchester, Inc.

SAFENET/400 FOR THE IBM SYSTEM i5 IMPLEMENTATION GUIDE Version MP Associates of Westchester, Inc. SAFENET/400 FOR THE IBM SYSTEM i5 IMPLEMENTATION GUIDE Version 8.0 2007 MP Associates of Westchester, Inc. How to contact us Direct all inquiries to: Kisco Information Systems 89 Church Street Saranac

More information

DEFINE FILE. Syntax: Arguments: TYPE= - Specifies the type of dataset being defined. - VSAM KSDS dataset. FTP read requests result in the entire file

DEFINE FILE. Syntax: Arguments: TYPE= - Specifies the type of dataset being defined. - VSAM KSDS dataset. FTP read requests result in the entire file DEFINE FILE The DEFINE FILE command adds a file to the TCP/IP for VSE file system. The file can be a VSAM file, a VSE library, the ICCF library set, the POWER queues, a sequential file an HFS repository,

More information

ARADIAL TECHNOLOGIES Aradial Enforcer Manual Version 7.0

ARADIAL TECHNOLOGIES Aradial Enforcer Manual Version 7.0 ARADIAL TECHNOLOGIES Aradial Enforcer Manual Version 7.0 Administration Guide A R A D I A L E N F O R C E R Administration Guide Aradial Technologies Ltd. Information in this document is subject to change

More information

Introduction. JES Basics

Introduction. JES Basics Introduction The Job Entry Subsystem (JES) is a #11 IN A SERIES subsystem of the z/os operating system that is responsible for managing jobs. The two options for a job entry subsystem that can be used

More information

IBM Security Identity Manager Version Administration Topics

IBM Security Identity Manager Version Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics ii IBM Security Identity Manager Version 6.0.0.5: Administration

More information

Online Management. Overview. CSI International 8120 State Route 138 Williamsport, OH

Online Management. Overview. CSI International 8120 State Route 138 Williamsport, OH Online Management Overview CSI International 8120 State Route 138 Williamsport, OH 43164-9767 http://www.csi-international.com (800) 795-4914 - USA (740) 420-5400 - Main Operator (740) 333-7335 - Facsimile

More information

Vanguard Active Alerts. Jim McNeill Sr Consultant

Vanguard Active Alerts. Jim McNeill Sr Consultant Vanguard Active Alerts Jim McNeill Sr Consultant Legal Notice Copyright All Rights Reserved. You have a limited license to view these materials for your organization s internal purposes. Any unauthorized

More information

FA TSCOPY Quick Start Guide. Quick Start Guide

FA TSCOPY Quick Start Guide. Quick Start Guide FA TSCOPY Quick Start Guide FATSCOPY Quick Start Guide V4.9L29-1 - FATSCOPY is a trademark of INNOVATION DATA PROCESSING and is registered with the US Patent and Trademark Office. FATSCOPY is a proprietary

More information

Installing and Administering a Satellite Environment

Installing and Administering a Satellite Environment IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00 IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00

More information

Release 5, Modification Level 0

Release 5, Modification Level 0 GI10-8140-00 Program Directory for use with Environmental Record Editing and Printin g Program Version 3 for VM 5654-260 Release 5, Modification Level 0 GI10-8140-00 Program Directory for use with Environmental

More information

IMS DB/DC for Technical Support

IMS DB/DC for Technical Support IMS DB/DC for Technical Support This course introduces and explains in detail IMS on-line operations. It provides the essential cross-training for systems support specialists from parallel disciplines

More information

Jim McNeill. Vanguard Professional Services VSS10 & VSS13

Jim McNeill. Vanguard Professional Services VSS10 & VSS13 Jim McNeill Vanguard Professional Services VSS10 & VSS13 1 2 Legal Notice Copyright 2017 Copyright by Vanguard Integrity Professionals, Inc. All rights reserved. Unauthorized reproduction, modification,

More information

IBM GLOBAL SERVICES. Session: E44. VSE Hot Topics. John Lawson. zseries Expo. Nov. 1-5, Miami, FL

IBM GLOBAL SERVICES. Session: E44. VSE Hot Topics. John Lawson. zseries Expo. Nov. 1-5, Miami, FL IBM GLOBAL SERVICES Session: E44 VSE Hot Topics John Lawson zseries Expo Nov. 1-5, 2004 Miami, FL IBM Corporation 2004 VSE/ESA Hot Topics John Lawson 1950 Stemmons Frwy. Suite 5001 Dallas, Texas 75207

More information

IBM. Archive Manager for z/vm Administration Guide. IBM Archive Manager for z/vm. Version 1 Release 1 SC

IBM. Archive Manager for z/vm Administration Guide. IBM Archive Manager for z/vm. Version 1 Release 1 SC IBM Archive Manager for z/vm IBM Archive Manager for z/vm Administration Guide Version 1 Release 1 SC18-9345-03 IBM Archive Manager for z/vm IBM Archive Manager for z/vm Administration Guide Version 1

More information

For TCP/IP for VSE and its related components, use the Product Key installation procedure found in the TCP/IP installation manual.

For TCP/IP for VSE and its related components, use the Product Key installation procedure found in the TCP/IP installation manual. June 10, 2008 CSI Product Keys in VSE All of the Software Products from CSI International are protected by a Product Key. For TCP/IP for VSE and its related components, use the Product Key installation

More information

CA Panvalet. Installation Guide. r14.6. Third Edition

CA Panvalet. Installation Guide. r14.6. Third Edition CA Panvalet Installation Guide r14.6 Third Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

ISPF Users Boot Camp - Part 2 of 2

ISPF Users Boot Camp - Part 2 of 2 Interactive System Productivity Facility (ISPF) ISPF Users Boot Camp - Part 2 of 2 SHARE 116 Session 8677 Peter Van Dyke IBM Australia SHARE 116, Winter 2011 pvandyke@au1.ibm.com Introduction Our jobs

More information

IBM z/vse. Version 3 Release 1 SC

IBM z/vse. Version 3 Release 1 SC IBM z/vse Diagnosis Tools Version 3 Release 1 SC33-8229-00 IBM z/vse Diagnosis Tools Version 3 Release 1 SC33-8229-00 Note! Before using this information and the product it supports, be sure to read the

More information

Configuring TACACS+ About TACACS+

Configuring TACACS+ About TACACS+ This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,

More information

masc-ato Automated Transaction Operator General Information *** VSE/MVS Version 4.1.0

masc-ato Automated Transaction Operator General Information *** VSE/MVS Version 4.1.0 masc-ato Automated Transaction Operator General Information *** VSE/MVS Version 4.1.0 MATO-GI410-2-E Distributor: masc ag Dept. SWD Birkenstr. 49 CH-6343 Rotkreuz (Switzerland) Telephone: 041 / 790 53

More information

Workshop: Unlock your z/vse data and applications for the mobile world. Last formatted on: Friday, June 26, 2015

Workshop: Unlock your z/vse data and applications for the mobile world. Last formatted on: Friday, June 26, 2015 Workshop: Unlock your z/vse data and applications for the mobile world Last formatted on: Friday, June 26, 2015 Ingo Franzki ifranzki@de.ibm.com Wilhelm Mild milhelm.mild@de.ibm.com Disclaimer This publication

More information

UC for Enterprise (UCE) Emergency On-Site Notification (E-OSN)

UC for Enterprise (UCE) Emergency On-Site Notification (E-OSN) UC for Enterprise (UCE) Emergency On-Site Notification (E-OSN) User Guide NEC NEC Corporation September 2010 NDA-31083 Issue 2 Liability Disclaimer NEC Corporation reserves the right to change the specifications,

More information

CA File Master Plus. ISPF User Guide. Release

CA File Master Plus. ISPF User Guide. Release CA File Master Plus ISPF User Guide Release 9.1.00 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation ), is

More information

User s Manual. Version 5

User s Manual. Version 5 User s Manual Version 5 Copyright 2017 Safeway. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language,

More information

CA JCLCheck Workload Automation CA RS 1404 Service List

CA JCLCheck Workload Automation CA RS 1404 Service List CA JCLCheck Workload Automation 12.0 1 CA RS 1404 Service List Description Hiper 12.0 RO62327 INVALID CAY6501 MESSAGE WITH MULTI-VOL DATASET AND NOSMS RO62328 INVALID CAY6501 MESSAGE WITH MULTI-VOL DATASET

More information

QTOS DATABASE QTOS TAPE LIBRARIANS GUIDE. Copyright 2017 QSA Enterprises, LLC

QTOS DATABASE QTOS TAPE LIBRARIANS GUIDE. Copyright 2017 QSA Enterprises, LLC QTOS DATABASE QTOS TAPE LIBRARIANS GUIDE 1 QSA Enterprises, LLC 100 Dry Mill Road Ste 101 Leesburg, VA 20151 Phone 703 771 9447 Fax 703 771 9448 PREFACE This book is intended for the Tape Librarian who's

More information

CICSPlex SM Managing Resource Usage

CICSPlex SM Managing Resource Usage CICS Transaction Server for z/os CICSPlex SM Managing Resource Usage Version 3 Release 1 SC34-6466-04 CICS Transaction Server for z/os CICSPlex SM Managing Resource Usage Version 3 Release 1 SC34-6466-04

More information

SAS Data Libraries. Definition CHAPTER 26

SAS Data Libraries. Definition CHAPTER 26 385 CHAPTER 26 SAS Data Libraries Definition 385 Library Engines 387 Library Names 388 Physical Names and Logical Names (Librefs) 388 Assigning Librefs 388 Associating and Clearing Logical Names (Librefs)

More information

EView/390 Management for HP OpenView Operations Unix

EView/390 Management for HP OpenView Operations Unix EView/390 Management for HP OpenView Operations Unix Concepts Guide Software Version: A.06.00 June 2007 Copyright 2007 EView Technology, Inc. EView Technology makes no warranty of any kind with regard

More information

CA Endevor Software Change Manager

CA Endevor Software Change Manager CA Endevor Software Change Manager CA Roscoe Interface Administration Guide Version 16.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

CA View. Release Notes. Release 12.2

CA View. Release Notes. Release 12.2 CA View Release Notes Release 12.2 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation ), is for your informational

More information

CA ACF CA RS 1711 Service List

CA ACF CA RS 1711 Service List CA ACF2 16.0 1 CA RS 1711 List Description Type RO93852 ACF2/IMS SUPPORT FOR IMS R15 PTF RO93853 ACF2/IMS SUPPORT FOR IMS R15 PTF RO97779 CONVERT PASSWORD TO HIGHER ENCRYPTION LEVEL/AAM R_PASSWORD PTF

More information

MU2b Authentication, Authorization and Accounting Questions Set 2

MU2b Authentication, Authorization and Accounting Questions Set 2 MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

IBM. TSO/E User's Guide. z/os. Version 2 Release 3 SA

IBM. TSO/E User's Guide. z/os. Version 2 Release 3 SA z/os IBM TSO/E User's Guide Version 2 Release 3 SA32-0971-30 Note Before using this information and the product it supports, read the information in Notices on page 229. This edition applies to Version

More information

A-LOG. User s Manual. Version 3.8

A-LOG. User s Manual. Version 3.8 A-LOG User s Manual Version 3.8 Manual Order Number: ALG-380-020-1 This manual is applicable to A-LOG product at Version 3.8 release level. Unless otherwise stated in new editions of this manual or A-LOG

More information

Chapter 1 INTRODUCTION. SYS-ED/ Computer Education Techniques, Inc.

Chapter 1 INTRODUCTION. SYS-ED/ Computer Education Techniques, Inc. Chapter 1 INTRODUCTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Different types of file access available to the programmer. How to define fields in a program. The flow of

More information

Equitrac Embedded for Sharp OSA. Setup Guide Equitrac Corporation

Equitrac Embedded for Sharp OSA. Setup Guide Equitrac Corporation Equitrac Embedded for Sharp OSA 1.4 Setup Guide 2012 Equitrac Corporation Equitrac Embedded for Sharp OSA Setup Guide Revision Date Revision List November 1, 2012 Updated for Equitrac Office/Express 4.2.5

More information

VSAM Management. Overview. z/os. CSI International 8120 State Route 138 Williamsport, OH

VSAM Management. Overview. z/os. CSI International 8120 State Route 138 Williamsport, OH VSAM Management Overview z/os CSI International 8120 State Route 138 Williamsport, OH 43164-9767 http://www.csi-international.com (800) 795-4914 - USA (740) 420-5400 - Main Operator (740) 333-7335 - Facsimile

More information

WAVV 2005 Colorado Springs, CO. Connecting VSE to the World. Page 1. Trademarks. Agenda. Copyright 2005 illustro Systems International, LLC

WAVV 2005 Colorado Springs, CO. Connecting VSE to the World. Page 1. Trademarks. Agenda. Copyright 2005 illustro Systems International, LLC Connecting VSE to the World Presented by: John Lawson illustro Systems 1950 Stemmons Frwy. Suite 5001 Dallas, Texas 75207 Phone: 214-800-8900 http://www.illustro.com Trademarks The following are registered

More information

CA-View Extract User Dialog

CA-View Extract User Dialog CA-View Extract User Dialog A User Friendly ISPF Interface to CA-View Reports Version 1.19 Revised June 16, 2003 Lionel B. Dyck Kaiser Permanente Information Technology 25 N. Via Monte Ave Walnut Creek,

More information

The SMF recovery analysis report (SRSSMF) formats SMF records produced by SRS and provides totals for the successful and unsuccessful recoveries

The SMF recovery analysis report (SRSSMF) formats SMF records produced by SRS and provides totals for the successful and unsuccessful recoveries 1 2 The SMF recovery analysis report (SRSSMF) formats SMF records produced by SRS and provides totals for the successful and unsuccessful recoveries performed by SRS. Oops, the wrong SRS! OK, the Real

More information

dba/m Database Manager V7.1 User s Guide

dba/m Database Manager V7.1 User s Guide dba/m Database Manager V7.1 User s Guide Release 7.1. May, 2005 Copyright Information Copyright 1996-2005 by Genus Software, Incorporated. All rights reserved. Trademark Acknowledgments NonStop dba/m Database

More information

IBM. MVS Interactive Problem Control System (IPCS) User's Guide. z/os. Version 2 Release 3 SA

IBM. MVS Interactive Problem Control System (IPCS) User's Guide. z/os. Version 2 Release 3 SA z/os IBM MVS Interactive Problem Control System (IPCS) User's Guide Version 2 Release 3 SA23-1384-30 Note Before using this information and the product it supports, read the information in Notices on page

More information

SIMATIC. SIMATIC Logon V User management and electronic signatures 1. Hardware and Software Requirements 2. Scope of delivery 3.

SIMATIC. SIMATIC Logon V User management and electronic signatures 1. Hardware and Software Requirements 2. Scope of delivery 3. User management and electronic signatures 1 Hardware and Software Requirements 2 SIMATIC Scope of delivery 3 Installation 4 SIMATIC Logon 5 Configuration Manual 12/2015 A5E34528136-AA Legal information

More information

Customizing System Security

Customizing System Security CHAPTER 3 Customizing System Security System security is an important consideration in data processing. Products like Access Control Facility 2 (CA-2), CA-TOP SECRET, or Resource Access Control Facility

More information

SAFENET/i FOR IBM i IMPLEMENTATION GUIDE Version MP Associates of Westchester, Inc.

SAFENET/i FOR IBM i IMPLEMENTATION GUIDE Version MP Associates of Westchester, Inc. SAFENET/i FOR IBM i IMPLEMENTATION GUIDE Version 9 2012 MP Associates of Westchester, Inc. How to contact us Direct all inquiries to: Kisco Information Systems 89 Church Street Saranac Lake, New York 12983

More information

Chapter 1 RUNNING A SIMPLE JOB. SYS-ED/ Computer Education Techniques, Inc.

Chapter 1 RUNNING A SIMPLE JOB. SYS-ED/ Computer Education Techniques, Inc. Chapter 1 RUNNING A SIMPLE JOB SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: z/os operating system and resource management. The role and functions of JCL. How to code basic JCL

More information

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation Equitrac Embedded for Kyocera Mita 1.3 Setup Guide 2012 Equitrac Corporation 2012 Equitrac Corporation Equitrac Embedded for Kyocera Mita Setup Guide Document Revision History Revision Date Revision List

More information

Electronic Records and Signatures with the Sievers M9 TOC Analyzer and DataPro2 Software

Electronic Records and Signatures with the Sievers M9 TOC Analyzer and DataPro2 Software Water Technologies & Solutions fact sheet 21 CFR Part 11 Electronic Records and Signatures with the Sievers M9 TOC Analyzer and DataPro2 Software introduction Part 11 of Title 21 of the Code of Federal

More information

PRISM-FHF The Fred Hollows Foundation

PRISM-FHF The Fred Hollows Foundation PRISM-FHF The Fred Hollows Foundation SECURITY ADMINISTRATOR S GUIDE Version 1.2 TABLE OF CONTENTS INTRODUCTION... 4 OVERVIEW... 4 SECURITY CONSOLE... 6 ACCESSING THE SECURITY CONSOLE... 6 VIEWING THE

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

CA-Explore Performance Management for CICS

CA-Explore Performance Management for CICS Unicenter CA-Explore Performance Management for CICS Getting Started Guide Release 7.0 K01098-1E This documentation and related computer software program (hereinafter referred to as the Documentation )

More information

Data Set Options. Specify a data set option in parentheses after a SAS data set name. To specify several data set options, separate them with spaces.

Data Set Options. Specify a data set option in parentheses after a SAS data set name. To specify several data set options, separate them with spaces. 23 CHAPTER 4 Data Set Options Definition 23 Syntax 23 Using Data Set Options 24 Using Data Set Options with Input or Output SAS Data Sets 24 How Data Set Options Interact with System Options 24 Data Set

More information

MANEWS Issue Number 21 the Mainframe Audit News

MANEWS Issue Number 21 the Mainframe Audit News This newsletter tells you stuff you need to know to audit IBM mainframe computers runinng with z/os and the MVS operating system. This issue we show you how to plan the data gathering for your audit. Table

More information

CA MII Data Sharing for z/os

CA MII Data Sharing for z/os CA MII Data Sharing for z/os CA MII Programming Guide Release 12.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Relativity Designer Installation Guide

Relativity Designer Installation Guide Liant Software Corporation Relativity Designer Installation Guide Version 5 Copyright 1994-2003 by Liant Software Corporation. All rights reserved. Printed in U.S.A. No part of this publication may be

More information

MFT Platform Server for z/os Release Notes

MFT Platform Server for z/os Release Notes MFT Platform Server for z/os Release Notes Version 7.1 Error! Unknown document property name. TIBCO provides the two-second advantage November 4, 2011 Table of Contents I. Introduction... 3 II. New Enhancements

More information

Payment Card Industry Internal Security Assessor: Quick Reference V1.0

Payment Card Industry Internal Security Assessor: Quick Reference V1.0 PCI SSC by formed by: 1. AMEX 2. Discover 3. JCB 4. MasterCard 5. Visa Inc. PCI SSC consists of: 1. PCI DSS Standards 2. PA DSS Standards 3. P2PE - Standards 4. PTS (P01,HSM and PIN) Standards 5. PCI Card

More information

eft213 NetEx/eFT for IBM z/os Systems Release Memo To Users June 2018 MTU-eFT213-R5.4.7

eft213 NetEx/eFT for IBM z/os Systems Release Memo To Users June 2018 MTU-eFT213-R5.4.7 eft213 NetEx/eFT for IBM z/os Systems Release 5.4.7 Memo To Users June 2018 1999-2018 Network Executive Software, Inc. 6450 Wedgwood Road North #103 Maple Grove, MN 55311 MTU-eFT213-R5.4.7 Document Revision

More information

GDPR Draft: Data Access Control and Password Policy

GDPR Draft: Data Access Control and Password Policy wea.org.uk GDPR Draft: Data Access Control and Password Policy Version Number Date of Issue Department Owner 1.2 21/01/2018 ICT Mark Latham-Hall Version 1.2 last updated 27/04/2018 Page 1 Contents GDPR

More information

What it does not show is how to write the program to retrieve this data.

What it does not show is how to write the program to retrieve this data. Session: A16 IFI DATA: IFI you don t know, ask! Jeff Gross CA, Inc. 16 October 2008 11:45 12:45 Platform: DB2 for z/os Abstract The Instrumentation Facility Interface (IFI) can be a daunting resource in

More information

IBM. User s Guide. NetView Access Services (MVS/ESA) Version 2 Release 1 SH

IBM. User s Guide. NetView Access Services (MVS/ESA) Version 2 Release 1 SH NetView Access Services (MVS/ESA) IBM User s Guide Version 2 Release 1 SH19-4499-00 NetView Access Services (MVS/ESA) IBM User s Guide Version 2 Release 1 SH19-4499-00 Note! Before using this information

More information

z/os Version 2 Release 3 TSO/E User's Guide IBM SA

z/os Version 2 Release 3 TSO/E User's Guide IBM SA z/os Version 2 Release 3 TSO/E User's Guide IBM SA32-0971-30 Note Before using this information and the product it supports, read the information in Notices on page 213. This edition applies to Version

More information

Proficy* HMI/SCADA - ifix C ONFIGURING S ECURITY F EATURES

Proficy* HMI/SCADA - ifix C ONFIGURING S ECURITY F EATURES Proficy* HMI/SCADA - ifix C ONFIGURING S ECURITY F EATURES Version 5.5 January 2012 All rights reserved. No part of this publication may be reproduced in any form or by any electronic or mechanical means,

More information