E-SRF. Security Signature Analysis. Release EKC Security Reporting Facility GENERAL AVAILABILITY. September 1, 2005 EKC Inc.

Size: px
Start display at page:

Download "E-SRF. Security Signature Analysis. Release EKC Security Reporting Facility GENERAL AVAILABILITY. September 1, 2005 EKC Inc."

Transcription

1 E-SRF EKC Security Reporting Facility Security Signature Analysis Release E-SRF V2R1M0 GENERAL AVAILABILITY September 1, 2005 EKC Inc.

2 E-SRF is a proprietary product developed and maintained by EKC Inc West Higgins Road Rosemont, Illinois USA (847) Technical Support: (847) EKC, Inc. provides only software program products which fully comply with, and maintain MVS integrity. The vendor hereby warrants that: 1) E-SRF ("Software") performs only those functions which are described in the published specifications; 2) there are no methods for gaining access to the Software or other computer resources or data of Licensee (such as a master access key, ID, password, or trap door) other than set forth in the published specifications; 3) the Software does not introduce any MVS integrity exposures. The program code, with the exception of one utility, runs totally in non-authorized, problem state. The one utility, EKCRXCAT, requires APF-authorization to read the MVS System Catalogs. A non-apf authorized utility, EKCRGCAT, is supplied to perform the same function, but at a considerably slower speed. 4) the software shall be year 2000 compliant, and shall function correctly in the next century according to published specifications as long as regular software maintenance is applied. Copyright EKC Inc. USA, 2005 All Rights Reserved Reproduction of this manual without written permission of EKC Inc. is strictly prohibited. Version 2, Release 1 September 1, 2005 All product names referenced herein are trademarks of their respective companies. Printed in USA Release 2.1 Revised September 1, 2005 ii

3 Contents E-SRF Security Signature Analysis...1 Introduction...1 JCL for Executing an E-SRF Security Signature Scan...2 SUMMARY DD OUTPUT...3 Scan Signature Types...6 Signature Scanning Control Parameters...7 Messages...9 Release 2.1 Revised September 1, 2005 iii

4 E-SRF Publications Name Installation Guide Contents E-SRF installation including: installation and maintenance steps, startup and shutdown considerations, and backup and recovery procedures. Change Summary Guide Contains all new features and system function changes. General Overview Resource Grouping Facility Guide Access Analysis Reports Guide for ACF2 Access Analysis Reports Guide for RACF Event Reporting User Guide An overview of E-SRF and its components. Brief overview of the Resource Grouping Facility, its relationship to E-SRF, language command syntax, TSO commands and JCL. Brief overview of Access Analysis reports, explanation of the DataOwner and Userid/LogonidOwner reports, command syntax, utilities necessary for creating input to reports, and JCL. A How To guide for users of E-SRF Event Reporting. Event Reporting Facility - Command Reference Explains the Event Reporting Facility command processor, command syntax, and JCL. Event Reporting Facility - Masterfile and Data Dictionary Reference Event Reporting Facility - Messages and Codes Event Reporting Facility - Report Overlays Guide Explains the structure of the E-SRF Masterfile and describes all Masterfile fields. Lists Event Reporting Facility messages and codes. An overview of the report overlays provided with the Event Reporting Facility. Release 2.1 Revised September 1, 2005 iv

5 E-SRF Security Signature Analysis Introduction Over time, things accumulate. Eventually, the clutter increases such that it becomes difficult to find things. This, of course, also happens with software and program libraries. As things accumulate, it may become difficult to find programs that perform certain functions. Locating programs doing security functions becomes important when changes have to be made. Whether upgrading security, implementing role modeling, or just plain remodeling, it becomes necessary to locate all programs related to security to keep everything working correctly. However, sometimes finding them all proves to be a challenge. This facility of E-SRF, the E-SRF Security Signature Analysis Reporting feature, was specifically developed to help when programs performing security related functions and calls accumulate. It locates those programs doing security kinds of things - and, it works for libraries of all types. Source code, object libraries, or load modules may be searched. Any program(s) containing traces of security types of information will be flagged and reported. The sole purpose of this E-SRF Signature Analysis Reporting program is to locate programs in libraries that are performing security type functions. This facility scans programs, searching for those that may be invoking RACF, CA-ACF2, or CA-TopSecret; or anything pertaining to security. These scanning functions are very useful when trying to locate legacy code performing security calls, particularly if the source code is no longer available. E-SRF Security Signature Analysis Page 1

6 JCL for Executing an E-SRF Security Signature Scan //LIBSCAN JOB (),'SCAN',CLASS=A,MSGCLASS=X, // MSGLEVEL=(1,1),NOTIFY=USERID //* //* THIS PROGRAM SCANS FOR SECURITY SIGNATURES //* IN LIBRARIES. //* //* //SCAN EXEC PGM=ESRS0SAR,REGION=4M //SYSUDUMP DD SYSOUT=* //SYSPRINT DD SYSOUT=* //SUMMARY DD SYSOUT=* //LIST0001 DD SYSOUT=* //INDD1 DD DISP=SHR,DSN=LIBRARY.PDS.LOAD //INDD2 DD DISP=SHR,DSN=LIBRARY.PDS.SOURCE //USERDICT DD DISP=SHR,DSN=USER.DICT.DATA //SYSIN DD * * CONTROL CARD INPUT STREAM * DO A COMPLETE SCAN FOR ANY KIND OF * SECURITY SIGNATURE FOR INDD1 AND INDD2 * SCAN DETAIL MAX-PASS USERDICT * * //* Signature analysis is executed as a batch JOB. The required JCL is shown above. The input libraries to be scanned are allocated by the INDD DD JCL statement. All DDNAMEs beginning with the characters INDD are scanned by the analysis program. In the example above, both the INDD1 and INDD2 statements point to libraries that are to be scanned. The USERDICT DD statement applies to all scans for all libraries in this JOB step. E-SRF Security Signature Analysis Page 2

7 SYSPRINT DD OUTOUT E-SRF IS A LICENSED PROGRAM PRODUCT OF EKC,INC.; ALL RIGHTS RESERVED. ESRS0SAR(I)-001,SIGNATURE FUNCTIONS BEING STARTED SCAN ALL MAX-PASS USERDICT ESRS0SAR(I)-020,FUNCTION COMPLETED, RC=0000,RE=0000 ESRS0SAR----OPTIONS IN EFFECT: Options Display is ACTIVE Scan is Set to MAX-PASS PDS Member Name Display is ON Count Data for Member is OFF Scanning for TEXT ESD OPCODE SVCS USER ESRS0SAR(I)-090,HIGHEST RETURN CODE FOR JOB WAS RC=0000 ESRS0SAR(I)-099,ALL AVAILABLE FUNCTIONS COMPLETE SUMMARY DD OUTPUT ESRS1SAR,E-SRF SECURITY REPORTING FACILITY---SIGNATURE ANALYSIS ROUTINE E-SRF Is A Licensed Program Product of EKC,Inc. Printed on 2005/08/02 by USERID ESRS1SAR(I)-100,Active RSS on System Z390 is RACF Read>* Read> EKC Using>>EKC *** Printing Dictionary Entries *** DEFINE USER DICTINARY ENTRIES Read> ACF60 Using>>ACF60 Read> ACF** Using>>ACF** Read>* ESRS1SAR(I)-020,E-O-F,SAMPLE.LOAD,LAST MEMBER READ: ETFRMENU ESRS1SAR(I)-022,MEMBER(S) W/SECURITY SIGNATURE(S): 09 *----READ SCANNED-- ---ALIAS---- -SIGNATURES-* *----z/os ACF RACF TSS-----* ESRS1SAR(I)-010,TOTAL RECORDS SUMMARY BELOW: *----READ SCANNED-- ---ALIAS---- -SIGNATURES-* *----z/os ACF RACF TSS-----* E-SRF Is A Licensed Program Product of EKC,Inc.; ALL RIGHTS RESERVED. E-SRF Security Signature Analysis Page 3

8 **** E-SRF Security Signature - Statistics Summary **** JES JOB ID...JOB08559 Files Searched...1 JOBname...EBSCAN Members Read...9 PROCname...SCAN Dictionary...3 STEPname...SCAN Signatures UserID...EB Match-Dict Date /08/02 All Others...52 Time...15:44:20 Members W/Sign...9 SMFID...P390 Max Signs/Mem EKC SiteID...C Min Signs/Mem...10 Max Signs/DSN Min Signs/DSN ESRS1SAR(I)-030,E-O-S,Highest Return Code,RC=00 E-SRF Is A Licensed Program Product of EKC,Inc.; ALL RIGHTS RESERVED. E-SRF Security Signature Analysis Page 4

9 ********************************* TOP OF DATA *************************** ESRS1SAR,E-SRF SECURITY REPORTING FACILITY---SIGNATURE ANALYSIS ROUTINE E-SRF Is A Licensed Program Product of EKC,Inc. Printed on 2005/08/02 by ESRS1SAR(I)-100,Active RSS on System P390 is RACF ESRS1SAR(I)-000,MA,1,EKSTG2,PO,U,DDNAME=INDD1 - SAMPLE.LOAD *-TYPE/SUBS-- -MODULE- -COUNT-OFFSET-SIGNATURE DATA------* USER-z/OS EKC00INF EKC z/os-z/os EKC00INF...1 ***ESD EKC USER-z/OS EKC00INF...1 ***ESD EKC > EKC00INF Total Count For Module=...10 USER-z/OS EKC00INI E EKC USER-z/OS EKC00INI F0 EKC z/os-z/os EKC00INI...12 ***ESD EKC z/os-z/os EKC00INI...1 ***ESD ETFR RACF-z/OS ETFRMENU EB USERID RACF-z/OS ETFRMENU F1 GROUP RACF-z/OS ETFRMENU B RACF z/os-z/os ETFRMENU...1 ***ESD ETFR > ETFRMENU Total Count For Module=...28 ESRS1SAR(I)-020,E-O-F,EB.ETFR.LOAD,LAST MEMBER READ: ETFRMENU ESRS1SAR(I)-022,MEMBER(S) W/SECURITY SIGNATURE(S): 09 *----READ SCANNED-- ---ALIAS---- -SIGNATURES-* *----z/os ACF RACF TSS-----* In the above example, security signatures were detected in the specified library. The first occurrence of a signature is printed along with its associated offset from the beginning of the module for each record section scanned, and multiple signatures of the same type with different offsets may appear. Note that for non-load module libraries the relative block number of the record just read is displayed instead. E-SRF Security Signature Analysis Page 5

10 Scan Signature Types String Data - Code Signatures - ESD - Displayed with the relative block number into the dataset (or member if a PDS) for the first occurrence of that particular string for non-load modules. Load modules show the signature data with an offset value into the load module instead. (Multiple occurrences may show a count value greater than 1 for the same signature, or may have multiple occurences, depending upon other data detected; either is correct.) Signatures of code sequences are displayed with offset and count values. These signatures are unique code sequences or security SVC calls. External Symbol Data entries will be flagged as ***ESD and will not have an offset or relative block number, since these are linkage edit/load module indicators making reference to another CSECT. E-SRF Security Signature Analysis Page 6

11 Signature Scanning Control Parameters E-SRF security signature scanning is controlled by parameters. These control parameters appear as card image input read from the SYSIN file specified in the JCL. They control the type of scanning to be performed, and how extensively to pursue it. These parameters fall into two categories: What to scan for and how extensively, and information to be printed. They consist of a command to the program, and additional operands as may be required. The SYSIN Control Parameters, or control cards are as specified below. SYSIN Control Cards Commands SCAN SUMMARY OPTIONS END - Initiates a scan request. Specified without operands or a user dictionary it initiates a read only operation to verify the contents of a file without performing a signature contents search. Default without operands is READ USER. - Print a summary report only. This command ignores the LISTnnnn DD Statement. Default without operands is DETAIL ONE-PASS USER - Prints control options in effect for each subsequent command as part of the SYSPRINT output. - Terminates all scan functions and exits. E-SRF Security Signature Analysis Page 7

12 Operands Controlling the Type of SCAN DETAIL GENERAL USER READ - Scan for every type of signature. This is a full scan and includes scans for security signatures in TEXT, it includes ESD, OPCODE, and SVCs searches for load modules, and also searches for any text matching optional user dictionary (USERDICT DD STATEMENT in JCL.) entries. This is the default for a summary command. - Scan for general security text. This type of scan is most useful when scanning source libraries for locally developed security calls. It does not search for vendor or security product specific signatures. User dictionary entries may be included in the scan if the USERDICT DD card is present in the JCL. - Limits searches to only data defined by the USERDICT DD statement. This operand is ignored if no USERDICT DD statement is specified in the JCL. - Specified without a USERDICT it initiates a read only operation to verify the data integrity of a file without an actual signature contents search. This is the default value for a scan command without operands.. Operands Controlling How Extensively to SCAN ONE-PASS MIN-PASS MAX-PASS - A very fast scan. The scanning proceeds only until a single instance of any specified signature is found, or until end of module. Once any type is located, the scanning proceeds to the next member in the library. This scan is useful for limiting the more intensive scans to the most likely candidates. - Scan until at least one instance of every type selected has been located, or the entire module is scanned until end of module. - Scan for every instance of the type(s) requested, and do not terminate scan until any and all instances which may exist are located. This is the most intensive scan; use it when a lighter scan has narrowed the search to the lost likely candidates. Operands Controlling Information to be Printed VENDOR USERDICT - Normal operation precludes printing information about modules containing IBM or Computer Associates programs; this reduces clutter. Specify VENDOR to force printing information for all security related modules. Specifying this option may result in longer scan times and voluminous output. It would normally be used after an initial scan has narrowed search results. - Causes the User Dictionary file, DDNAME=USERDICT, to be echoed in the SUMMARY report. Default value is to suppress this printout. E-SRF Security Signature Analysis Page 8

13 Messages ESRS0SAR(I)-001,SIGNATURE FUNCTIONS BEING STARTED An informational message indicating the program has initialized, and is ready to perform scanning functions. ESRS0SAR(W)-002,NO SIGNATURE FUNCTION(S) REQUESTED A warning message indicating no commands were in the command input stream. ESRS0SAR(E)-012,MODULE NOT FOUND >>> mmmmmm A requested routine,mmmmmmmm, was missing. This is probably an installation error. Contact your systems programmer ESRS0SAR(E)-013,MUTUALLAY EXCLUSIVE >>> oooooooo The command/operand(s) combinationoooooooo conflicts. The command was not executed. ESRS0SAR(E)-014,OPERAND NOT FOUND >>> oooooooo The operandoooooooo is either misspelled, or otherwise syntactically incorrect. Correct the operand and re-run the JOB. ESRS0SAR(E)-015,COMMAND NOT FOUND >>> cccccccc The command cccccccc is either misspelled, or otherwise syntactically incorrect. Correct the syntax and re-run the JOB. ESRS0SAR(E)-016,INVALID CONTROL INPUT>>> --image-- The image is not valid command entry syntax. Correct the command syntax and re-run the JOB. ESRS0SAR(I)-020,FUNCTION COMPLETED, RC=cccc, RE=eeee A Signature Analysis command function has completed. The return code from this command was cccc, along with its associated reason code. ESRS0SAR(I)-090,HIGHEST RETURN CODE FOR JOB WAS RC=nnnn The Signature Analysis program has completed. The final, highest, return code from all program functions was nnnn. ESRS0SAR(I)-099,ALL AVAILABLE FUNCTIONS COMPLETE The Signature Analysis program JOBSTEP has ended. ESRS1SAR(I)-000,oo,C,volume,PO PS,F U V,DDNAME=ddn - dsname The Signature Analysis program is processing program library dsname from DDNAME ddn which is located on volume volume. Only the first volume is read. If C is greater the one, additional DD cards pointing must be added. ESRS1SAR(W)-001,MULTI-VOLUME(M) DATASET, dsname A warning that the current dataset being processed resides on multiple volumes. Only the first volume is processed by the Signature Analysis Routines. Add the appropriate DD cards to process other volumes. ESRS1SAR(E)-003,Summary DDNAME Missing,Ended,RC=12 The Signature Analysis Routines require a DDNAME of SUMMARY be present in the JCL; the JOB is terminated with a return code of 12. Add the required DD card and re-run the JOB. ESRS1SAR(I)-010,TOTAL RECORDS SUMMARY BELOW: This is a Summary Information recap of the previous function(s). E-SRF Security Signature Analysis Page 9

14 ESRS1SAR(I)-011,PARMS: This message optionally displays the parameters selected for the requested function as a result of an Options command in the command input stream. ESRS1SAR(I)-020,E-O-F,<LAST MEMBER READ:mmmmmmmm> Membermmmmmmmm was the last member read from the input file scanned if it was a partitioned dataset. ESRS1SAR(I)-022,MEMBER(S) W/SECURITY SIGNATURE(S): nnnn The count of membersnnnn contained in the library just scanned containing valid security signatures. ESRS1SAR(I)-030,E-O-S,Highest Return Code,RC=nnnn End of Scan; the Signature Analysis command function has completed. The return code was nnnn ESRS1SAR(I)-100,Active RSS on System ##id is ACF2 RACF TSS E-SRF has determined that the currently active Resident Security System on CPU with SMF ID ##id is one of either ACF2, RACF, or TopSecret. ESRS1SAR(E)-901,User Dictionary Failed to Open A USERDICT DD statement specified in the JCL referred to dataset that could not be opened. Correct the JCL and re-run the JOB. ESRS1SAR(E)-904,CANNOT OPEN DDNAME= dddddddd A DD statement of dddddddd specified in the JCL referred to dataset that could not be opened. Correct the JCL and re-run the JOB. ESRS1SAR(E)-905,First byte is not comment: tttt The text tttt found I column 1 of the input stream was not a valid comment card. Correct the input commands and re-run the JOB. ESRS1SAR(W)-906,No Library(s) to Process,Ended,RC=4 No commands were specified in the command input stream. Correct the JCL and re-run the JOB ESRS1SAR(E)-907,Invalid User Dictionary Data: A USERDICT DD statement specified in the JCL referred to dataset containing invalid dictionary data strings. Correct the JCL or dictionary data and re-run the JOB. ESRS1SAR(E)-916,FATAL INTERNAL ERROR A fatal error occurred; and the JOB was halted. Check other accompanying messages to determine the nature of the error. If no other messages are present contact your systems programmer or EKC Technical Support. E-SRF Security Signature Analysis Page 10

E-SRF EKC Security Reporting Facility Release 2.1 Installation Guide

E-SRF EKC Security Reporting Facility Release 2.1 Installation Guide E-SRF EKC Security Reporting Facility Release 2.1 Installation Guide E-SRF V2R1 EKC Inc. E0109101-0 E-SRF is a proprietary product developed and maintained by EKC Inc. 10400 West Higgins Road Rosemont,

More information

E-SRF. Messages and Codes. Release 2.1. EKC Security Event Reporting Facility. E-SRF V2R1 GENERAL AVAILABILITY, Revised February 13, 2005 EKC Inc.

E-SRF. Messages and Codes. Release 2.1. EKC Security Event Reporting Facility. E-SRF V2R1 GENERAL AVAILABILITY, Revised February 13, 2005 EKC Inc. E-SRF EKC Security Event Reporting Facility Release 2.1 Messages and Codes E-SRF V2R1 GENERAL AVAILABILITY, Revised February 13, 2005 EKC Inc. E-SRF is a proprietary product developed and maintained by

More information

E-SRF. Masterfile and Data Dictionary Reference. Release 2.1. EKC Security Event Reporting Facility

E-SRF. Masterfile and Data Dictionary Reference. Release 2.1. EKC Security Event Reporting Facility E-SRF EKC Security Event Reporting Facility Release 2.1 Masterfile and Data Dictionary Reference E-SRF V2R1 GENERAL AVAILABILITY, Revised February 13, 2005 EKC Inc. E-SRF is a proprietary product developed

More information

E-SRF. Command Reference. Release 2.1. EKC Security Event Reporting Facility. E-SRF V2R1 GENERAL AVAILABILITY, Revised February 13, 2005 EKC Inc.

E-SRF. Command Reference. Release 2.1. EKC Security Event Reporting Facility. E-SRF V2R1 GENERAL AVAILABILITY, Revised February 13, 2005 EKC Inc. E-SRF EKC Security Event Reporting Facility Release 2.1 Command Reference E-SRF V2R1 GENERAL AVAILABILITY, Revised February 13, 2005 EKC Inc. E-SRF is a proprietary product developed and maintained by

More information

E-SRF EKC Security Reporting Facility Access Analysis Reports Guide for RACF

E-SRF EKC Security Reporting Facility Access Analysis Reports Guide for RACF E-SRF EKC Security Reporting Facility Access Analysis Reports Guide for RACF E-SRF V2R1 EKC Inc. E9808106-1 E-SRF is a proprietary product developed and maintained by EKC Inc. 10400 West Higgins Road Rosemont,

More information

Appendix. Messages and codes

Appendix. Messages and codes Appendix. Messages and codes This appendix documents the messages and error codes issued by IMS Batch Backout Manager. Messages Each message is suffixed with one of the following letters: E Means that

More information

PDSUPDTE. 4. When the length of STRING2 is less than that of STRING1, blanks are inserted after the next pool of two blanks following STRING1.

PDSUPDTE. 4. When the length of STRING2 is less than that of STRING1, blanks are inserted after the next pool of two blanks following STRING1. PDSUPDTE PDSUPDTE is a batch card image tailoring procedure and is designed to change selected fields in JCL and control statements contained in libraries (Partitioned Datasets). Control statements can

More information

CA Software Change Manager for Mainframe

CA Software Change Manager for Mainframe CA Software Change Manager for Mainframe Reports Guide r12 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational

More information

//PSWDGEN EXEC PGM=RAIPWG //STEPLIB DD DISP=SHR,DSN=&RAILOAD //SYSTSPRT DD SYSOUT=* //SYSIN DD

//PSWDGEN EXEC PGM=RAIPWG //STEPLIB DD DISP=SHR,DSN=&RAILOAD //SYSTSPRT DD SYSOUT=* //SYSIN DD Appendix P Updating Product Passwords A CPU password is required to install and operate Relational Architects International (RAI) products on either a trial or permanent basis. The jobstream described

More information

CA PDSMAN PDS Library Management CA RS 1404 Service List

CA PDSMAN PDS Library Management CA RS 1404 Service List CA PDSMAN PDS Library Management 7.7 1 CA RS 1404 Service List Description Hiper 7.7 RO66063 $DEMO MAY FAIL WITH I/O ERROR AND U0001 ABEND RO66078 PDSMENT-2 OR U0001 ABEND TERMINATING HEALTH CHECKS RO66087

More information

* Parameter... 1:18. B Backward References... 5:8 Blocksize: Choosing... 3:19

* Parameter... 1:18. B Backward References... 5:8 Blocksize: Choosing... 3:19 * Parameter... 1:18 A Abnormal Disposition... 2:7 ACB: Access Method Control Block... 11:7 Accounting Information... 1:9, 8:15 ACCT Parameter - Account... 1:15 Allocation and Termination Messages... 1:25

More information

CA Compress Data Compression

CA Compress Data Compression CA Compress Data Compression Message Reference Guide Release 5.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

CA General Transaction Server

CA General Transaction Server CA General Transaction Server Message Reference Guide Version 12.0.00 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation

More information

IBM Education Assistance for z/os V2R1

IBM Education Assistance for z/os V2R1 IBM Education Assistance for z/os V2R1 Item: In-Stream Data in JCL Procedures and Includes Element/Component: JES3 Material is current as of June 2013 I n Agenda Trademarks Presentation Objectives Overview

More information

COMPUTER EDUCATION TECHNIQUES, INC. (JCL ) SA:

COMPUTER EDUCATION TECHNIQUES, INC. (JCL ) SA: In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions. 3. Send this assessment with the answers via: a. FAX to (212) 967-3498. Or b. Mail the answers

More information

MVS/QuickRef - Tailoring QW

MVS/QuickRef - Tailoring QW MVS/QuickRef - Tailoring QW Speaker Name: Chuck Davis Speaker Company: Chicago-Soft, Ltd. Date of Presentation: February 5, 2013 Session Number: 12489 cdavis@quickref.com Planned topics include - 1 of

More information

Chicago Interface Group, Inc. Error Codes and Messages. January 2008

Chicago Interface Group, Inc. Error Codes and Messages. January 2008 Chicago Interface Group, Inc. Error Codes and Messages January 2008 Chicago Interface Group, Inc. 858 West Armitage Avenue #286 Chicago, IL 60614 USA Phone: (773) 524-0998 Fax: (815) 550-6088 Internet:

More information

T01F3nnn - FTP3 Messages

T01F3nnn - FTP3 Messages CHAPTER 18 T01F3nnn - FTP3 Messages This chapter describes the messages issued by the FTP3 program. These include messages T01F3001 through T01F3999. T01F3nnn T01F3000I FTP Cisco IOS for S/390 version

More information

Transporting files between MVS and MVS or between MVS and a Workstation

Transporting files between MVS and MVS or between MVS and a Workstation Transporting files between MVS and MVS or between MVS and a Workstation author: Lionel B. Dyck Revision 1.207 May 07, 2003 If there is a need to transport any file from the IBM MVS computing systems to

More information

Is Your z/os System Secure?

Is Your z/os System Secure? Ray Overby Key Resources, Inc. Info@kr-inc.com (312) KRI-0007 A complete z/os audit will: Evaluate your z/os system Identify vulnerabilities Generate exploits if necessary Require installation remediation

More information

The Acrobat PDF Format

The Acrobat PDF Format Messages This manual applies to ThruPut Manager Version 7 Release 1.0 PTF level 7109 and to all further releases until otherwise indicated. This material contains proprietary information on ThruPut Manager.

More information

IBM Education Assistance for z/os V2R1

IBM Education Assistance for z/os V2R1 IBM Education Assistance for z/os V2R1 Item: PARMDD Element/Component: BCP Scheduler Material is current as of June 2013 Agenda Trademarks Presentation Objectives Overview Usage & Invocation Interactions

More information

Enterprise Library Software

Enterprise Library Software Enterprise Library Software LCM Messages and Codes Version 7.1 Revision AA October 2010, Revision AA Submit comments about this document by clicking the Feedback [+] link at: http://docs.sun.com Copyright

More information

Data Center Management Systems

Data Center Management Systems Data Center Management Systems The Expert JCL Manager - JED The Future of Automated JCL Management JED Highlights:(Partial list) The JED Process Operating Environments Supported JED Features and Functions

More information

FA TSCOPY Quick Start Guide. Quick Start Guide

FA TSCOPY Quick Start Guide. Quick Start Guide FA TSCOPY Quick Start Guide FATSCOPY Quick Start Guide V4.9L29-1 - FATSCOPY is a trademark of INNOVATION DATA PROCESSING and is registered with the US Patent and Trademark Office. FATSCOPY is a proprietary

More information

Uni Hamburg Mainframe Summit 2010 z/os The Mainframe Operating. Part 6 z/os Concepts

Uni Hamburg Mainframe Summit 2010 z/os The Mainframe Operating. Part 6 z/os Concepts Uni Hamburg Mainframe Summit 2010 z/os The Mainframe Operating Part 6 z/os Concepts Redelf Janßen IBM Technical Sales Mainframe Systems Redelf.Janssen@de.ibm.com Course materials may not be reproduced

More information

MANEWS Issue Number 21 the Mainframe Audit News

MANEWS Issue Number 21 the Mainframe Audit News This newsletter tells you stuff you need to know to audit IBM mainframe computers runinng with z/os and the MVS operating system. This issue we show you how to plan the data gathering for your audit. Table

More information

ENQ Downgrade & CA MIM Update

ENQ Downgrade & CA MIM Update ENQ Downgrade & CA MIM Update Sujay Solomon Jason Tucker CA Technologies August 7 th 2014 Session #16085 Insert Custom Session QR if Desired. www.share.org ENQ downgrade capability Initiator s use of the

More information

The Web Version of this chapter is split into 4 pages - this is page 2 - page contents are as follows:

The Web Version of this chapter is split into 4 pages - this is page 2 - page contents are as follows: http://wwwmvsbookfsnetcouk/chap03bhtm 1 of 6 11/2/2001 1:47 PM MVS Systems Programming Home Chapter 3b - MVS Internals Contents The Web Version of this chapter is split into 4 pages - this is page 2 -

More information

E-SRF. Grouping Facility. Release 2.1. EKC Security Reporting Facility. E-SRF V2R1 GENERAL AVAILABILITY, Revised May 19, 2005 EKC Inc.

E-SRF. Grouping Facility. Release 2.1. EKC Security Reporting Facility. E-SRF V2R1 GENERAL AVAILABILITY, Revised May 19, 2005 EKC Inc. E-SRF EKC Security Reporting Facility Release 2.1 Grouping Facility E-SRF V2R1 GENERAL AVAILABILITY, Revised May 19, 2005 EKC Inc. The Resource Grouping Facility is a proprietary product developed and

More information

See the mechanics of how to do this for a cycle-driven process with a high degree of usability and easy job output management.

See the mechanics of how to do this for a cycle-driven process with a high degree of usability and easy job output management. Abstract: When concurrency is not needed for warehouse applications it is possible to use standard z/os tools to load a Db2 Analytics Accelerator without sample programs or 3rd party tools. See the mechanics

More information

Chapter 1: Messages and Codes

Chapter 1: Messages and Codes 5 Chapter 1: Messages and Codes QUEST Processor Messages... 5 CONTROL Processor Messages... 5 SYSTEM 2000 Interface Messages... 6 System-Wide and Multi-User Messages... 7 SYSTEM 2000 Error Codes... 7 WTO

More information

Chapter 1 RUNNING A SIMPLE JOB. SYS-ED/ Computer Education Techniques, Inc.

Chapter 1 RUNNING A SIMPLE JOB. SYS-ED/ Computer Education Techniques, Inc. Chapter 1 RUNNING A SIMPLE JOB SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: z/os operating system and resource management. The role and functions of JCL. How to code basic JCL

More information

RA/2 RACF CLI Version 1 - Release 1

RA/2 RACF CLI Version 1 - Release 1 RA/2 RACF CLI Version 1 - Release 1 Copyright racfra2.com 2008 All Rights Reserved Distributed by: SEA America Inc. SEA Europe EBM Inc. Ubiquity Pty Ltd Softplex Japan racfra2.com corp. TABLE OF CONTENTS

More information

IBM InfoSphere Optim for z/os Version 7 Release 2. Batch Utilities

IBM InfoSphere Optim for z/os Version 7 Release 2. Batch Utilities IBM InfoSphere Optim for z/os Version 7 Release 2 Batch Utilities IBM InfoSphere Optim for z/os Version 7 Release 2 Batch Utilities Note Before using this information and the product it supports, read

More information

Failures under MVS p. 67 General p. 67 JCL Errors p. 68 Syntactical JCL Errors p. 68 Allocation JCL Errors p. 69 ABEND Failures p.

Failures under MVS p. 67 General p. 67 JCL Errors p. 68 Syntactical JCL Errors p. 68 Allocation JCL Errors p. 69 ABEND Failures p. About the Author p. vii Preface p. xv Acknowledgments p. xix Introduction p. 1 Historical Perspective p. 1 JCL Complexity p. 3 Multiprogramming and Virtual Storage p. 4 Data Set Organizations p. 8 Non-VSAM

More information

PIE/TSO Dynamic Steplib Administrator Guide. Release 3.2.1

PIE/TSO Dynamic Steplib Administrator Guide. Release 3.2.1 TM PIE/TSO Dynamic Steplib Administrator Guide Release 3.2.1 PTSOIG321-01 Printed: October 2002 1984-2002 UNICOM Systems, Incorporated All Rights Reserved No part of this manual may be reproduced or transmitted

More information

CA Endevor Software Change Manager CA RS 1606 Service List

CA Endevor Software Change Manager CA RS 1606 Service List CA Endevor Software Change Manager 17.0 1 CA RS 1606 Service List Description Type 17.0 RO88314 PACKAGE CAST DOES NOT FAIL IF SUBSYSTEM DOES NOT EXIST PTF RO89322 C1X0250W MESSAGE STOPS THE PROCESSOR EXECUTION

More information

CA XCOM Data Transport for z/os CA RS 1312 Service List

CA XCOM Data Transport for z/os CA RS 1312 Service List CA XCOM Data Transport for z/os 11.6 1 CA RS 1312 Service List Description Hiper 11.6 RO59456 BATCH - TYPE=EXECUTE DEFAULTS TO WRONG DSNTYPE RO59725 VOL PARAMETER NOT HONORED, PDS CREATED ON WRONG VOLUME

More information

Stonebranch Solutions

Stonebranch Solutions Stonebranch Solutions Version 4.3.0 Stonebranch Solutions Installation Guide sb-install-4301 Stonebranch Solutions Installation Guide Stonebranch Solutions 4.3.0 Document Name Document ID Stonebranch

More information

CA File Master Plus. ISPF User Guide. Release

CA File Master Plus. ISPF User Guide. Release CA File Master Plus ISPF User Guide Release 9.1.00 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation ), is

More information

z/os Learning Center: Introduction to ISPF Unit 1: The Basics of ISPF and Data Sets Module 3: ISPF Data Set Basics

z/os Learning Center: Introduction to ISPF Unit 1: The Basics of ISPF and Data Sets Module 3: ISPF Data Set Basics z/os Learning Center: Introduction to ISPF Unit 1: The Basics of ISPF and Data Sets Module 3: ISPF Data Set Basics Copyright IBM Corp., 2005. All rights reserved. Data Set Basics Introduction This module,

More information

Version 1 Release 2. IBM IMS Cloning Tool User's Guide IBM SC

Version 1 Release 2. IBM IMS Cloning Tool User's Guide IBM SC Version 1 Release 2 IBM IMS Cloning Tool User's Guide IBM SC19-3757-01 Version 1 Release 2 IBM IMS Cloning Tool User's Guide IBM SC19-3757-01 Note: Before using this information and the product it supports,

More information

CA Endevor Software Change Manager

CA Endevor Software Change Manager CA Endevor Software Change Manager CA Roscoe Interface Administration Guide Version 16.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

A-LOG. User s Manual. Version 3.8

A-LOG. User s Manual. Version 3.8 A-LOG User s Manual Version 3.8 Manual Order Number: ALG-380-020-1 This manual is applicable to A-LOG product at Version 3.8 release level. Unless otherwise stated in new editions of this manual or A-LOG

More information

CA View. Release Notes. Release 12.2

CA View. Release Notes. Release 12.2 CA View Release Notes Release 12.2 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation ), is for your informational

More information

CA JCLCheck Workload Automation CA RS 1412 Service List

CA JCLCheck Workload Automation CA RS 1412 Service List CA JCLCheck Workload Automation 12.0 1 CA RS 1412 Service List Description Type 12.0 RO74965 S047 ABEND EXECUTING EJCK PTF RO75369 MESSAGE CAY6500S ABEND S0C4 IN XDESTJES PTF RO75434 S0C4 ABEND IN MODULE

More information

Dino Explorer. MVS Data Collector for Mainframe Assessment

Dino Explorer. MVS Data Collector for Mainframe Assessment Dino Explorer MVS Data Collector for Mainframe Assessment Index of contents 1 - Introduction...3 2 - The Installation Guide...4 2.1 Step 1 Copy the dxplload.xmit to MVS...4 2.2 Step 2 Receive XMIT file...6

More information

Vanguard ez/signon Client Installation and User Guide

Vanguard ez/signon Client Installation and User Guide Vanguard ez/signon Client Installation and User Guide Version 5.1 Vanguard ez/signon Version 5.1 Document Number VZSI-081503-511U September, 2003 Copyright 1997-2003 Vanguard Integrity Professionals-Nevada.

More information

In mainframe environment, programs can be executed in batch and online modes. JCL is used for submitting a program for execution in batch mode.

In mainframe environment, programs can be executed in batch and online modes. JCL is used for submitting a program for execution in batch mode. About the Tutorial Job Control Language (JCL) is the command language of Multiple Virtual Storage (MVS), which is the commonly used Operating System in the IBM Mainframe computers. JCL identifies the program

More information

CA 1 Tape Management CA RS 1403 Service List

CA 1 Tape Management CA RS 1403 Service List CA 1 Tape Management 12.6 1 CA RS 1403 Service List Release Service Description Hiper 12.6 RO60054 S0C4 ABEND DURING CLOSE PROCESSING OF 31 BIT UNCAPTURED UCB. RO62065 TMPIUSG3 ZVAR ERROR UPDATING TMOOPT00

More information

z/os Introduction and Workshop Data Sets

z/os Introduction and Workshop Data Sets z/os Introduction and Workshop Data Sets 2009 IBM Corporation Unit Objectives After completing this unit, you should be able to: Describe data set naming rules Describe a partitioned data set Describe

More information

Eleven Steps to Make Mainframe Security Audits More Effective and Efficient

Eleven Steps to Make Mainframe Security Audits More Effective and Efficient Eleven Steps to Make Mainframe Security Audits More Effective and Efficient These are some things I ve learned about auditing IBM mainframe computers by trying a lot of approaches, some of which worked

More information

Compute (Bridgend) Ltd

Compute (Bridgend) Ltd Compute (Bridgend) Ltd SELCOPY 2.02 New Features for IBM Mainframe z/os, VSE & VM/CMS Systems 8 Merthyr Mawr Road, Bridgend, Wales UK CF31 3NH Tel: +44 (1656) 65 2222 Fax: +44 (1656) 65 2227 CBL Web Site

More information

CA MII Data Sharing for z/os

CA MII Data Sharing for z/os CA MII Data Sharing for z/os CA MII Programming Guide Release 12.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Configuring zsecure To Send Data to QRadar

Configuring zsecure To Send Data to QRadar Configuring zsecure To Send Data to QRadar CONFIGURATION, SETUP, AND EXAMPLES Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free:

More information

CA ACF CA RS 1711 Service List

CA ACF CA RS 1711 Service List CA ACF2 16.0 1 CA RS 1711 List Description Type RO93852 ACF2/IMS SUPPORT FOR IMS R15 PTF RO93853 ACF2/IMS SUPPORT FOR IMS R15 PTF RO97779 CONVERT PASSWORD TO HIGHER ENCRYPTION LEVEL/AAM R_PASSWORD PTF

More information

Infoprint Server Update for z/os 2.2

Infoprint Server Update for z/os 2.2 Infoprint Server Update for z/os 2.2 Howard Turetzky, EDP Advanced Technical Support Ricoh Production Print Solutions Boulder, Colorado 80301 howard.turetzky@ricoh-usa.com Agenda New function in Infoprint

More information

Chapter 14. Reclaiming CIs in secondary index databases with FPA

Chapter 14. Reclaiming CIs in secondary index databases with FPA Chapter 14. Reclaiming CIs in secondary index databases with FPA Use the FPA Freespace Reclaim function to reclaim the control interals (CIs) in secondary index database data sets. Topics: Functions of

More information

Now Available in z/os V2R2 JES3: OUTDISP

Now Available in z/os V2R2 JES3: OUTDISP Now Available in z/os V2R2 JES3: OUTDISP David Jones IBM JES3 Development August 12, 2015 Session 17599 at 4:30 5:30 PM Trademarks The following are trademarks of the International Business Machines Corporation

More information

IBM. MVS Interactive Problem Control System (IPCS) User's Guide. z/os. Version 2 Release 3 SA

IBM. MVS Interactive Problem Control System (IPCS) User's Guide. z/os. Version 2 Release 3 SA z/os IBM MVS Interactive Problem Control System (IPCS) User's Guide Version 2 Release 3 SA23-1384-30 Note Before using this information and the product it supports, read the information in Notices on page

More information

Using PDSEs in your SYSPLEX: Best Practices and Troubleshooting

Using PDSEs in your SYSPLEX: Best Practices and Troubleshooting Using PDSEs in your SYSPLEX: Best Practices and Troubleshooting Insert Custom Session QR if Desired. Speaker: Thomas Reed /IBM Corporation SHARE Pittsburgh 2014 Session:16126 (C) 2012, 2013 IBM Corporation

More information

IBM. OMEGAVIEW and OMEGAVIEW II for the Enterprise. Configuring OMEGAVIEW and OMEGAVIEW II for the Enterprise. Tivoli. Version 3.1.

IBM. OMEGAVIEW and OMEGAVIEW II for the Enterprise. Configuring OMEGAVIEW and OMEGAVIEW II for the Enterprise. Tivoli. Version 3.1. Tivoli OMEGAVIEW and OMEGAVIEW II for the Enterprise IBM Version 3.1.0 Configuring OMEGAVIEW and OMEGAVIEW II for the Enterprise SC32-9426-00 12 1 2 Tivoli OMEGAVIEW and OMEGAVIEW II for the Enterprise

More information

A Guided Tour of. Policy-Based Data Set Encryption. Eysha S. Powers Enterprise Cryptography, IBM

A Guided Tour of. Policy-Based Data Set Encryption. Eysha S. Powers Enterprise Cryptography, IBM A Guided Tour of Policy-Based Data Set Encryption Eysha S. Powers Enterprise Cryptography, IBM eysha@us.ibm.com 0 Getting Started 1. Configure Crypto Express Cards 2. Configure ICSF 3. Start ICSF 4. Load

More information

INNOVATION TECHSUPPORT

INNOVATION TECHSUPPORT INNOVATION TECHSUPPORT VOLUME 3.1 Welcome to the third issue of INNOVATION TECH SUPPORT. TECHSUPPORT is intended as INNOVATION s communication vehicle to those responsible for the use of INNOVATION s products.

More information

Appendix B WORKSHOP. SYS-ED/ Computer Education Techniques, Inc.

Appendix B WORKSHOP. SYS-ED/ Computer Education Techniques, Inc. Appendix B WORKSHOP SYS-ED/ Computer Education Techniques, Inc. 1 ISPF/PDF Environment 1. Log on to ISPF/PDF; different installations have different logon procedures. 1.1. The ISPF/PDF Primary Option Menu

More information

Mainframe Developer & Admin Training in Chennai

Mainframe Developer & Admin Training in Chennai Mainframe Developer & Admin Training in Chennai Training in Greens Technology provides 100% real-time, practical and placement focused Mainframe Developer training in Chennai. Our Mainframe Developer course

More information

Chapter 2 TSO COMMANDS. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 TSO COMMANDS. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 TSO COMMANDS SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Executing TSO commands in READY mode or ISPF. The format of a TSO command - syntax and usage. Allocating a

More information

Using a Harness to control execution

Using a Harness to control execution On LinkedIn in July 2018 a question was raised as to the possibility of controlling the execution of a Job Step from within a COBOL program. The case presented was of a three step job where the second

More information

USING EXISTING DATASETS

USING EXISTING DATASETS Chapter 2 USING EXISTING DATASETS SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Coding DD statement parameters for existing datasets. Coding statements for tape datasets. Concatenating

More information

Chapter 13. Synchronizing secondary index databases with a DEDB with FPA

Chapter 13. Synchronizing secondary index databases with a DEDB with FPA Chapter 13. Synchronizing secondary index databases with a DEDB with FPA Use the Resync function of FPA to synchronize secondary index databases with their primary DEDB database. Topics: v Functions of

More information

IBM. PDF file of IBM Knowledge Center topics. IBM Operations Analytics for z Systems. Version 2 Release 2

IBM. PDF file of IBM Knowledge Center topics. IBM Operations Analytics for z Systems. Version 2 Release 2 IBM Operations Analytics for z Systems IBM PDF file of IBM Knowledge Center topics Version 2 Release 2 IBM Operations Analytics for z Systems IBM PDF file of IBM Knowledge Center topics Version 2 Release

More information

MAPnnn - Portmapper Log Messages

MAPnnn - Portmapper Log Messages CHAPTER 6 - Portmapper Log Messages This chapter describes messages written to logs by the Portmapper. MAP000I PORTMAP INITIALIZATION SUCCESSFULLY COMPLETED. Explanation The MAP task group was successfully

More information

ASSIST Assembler Replacement User s Guide

ASSIST Assembler Replacement User s Guide ASSIST Assembler Replacement User s Guide Program&Documentation: John R. Mashey Pro ject Supervision : Graham Campbell PSU Computer Science Department Preface This manual is the key reference source for

More information

SAS Technical Support Document TS-678 Installing the SAS 9.0 Object Spawner for SAS 8.2 Servers on OS/390 and z/os Platforms

SAS Technical Support Document TS-678 Installing the SAS 9.0 Object Spawner for SAS 8.2 Servers on OS/390 and z/os Platforms SAS Technical Support Document TS-678 Installing the SAS 9.0 Object Spawner for SAS 8.2 Servers on OS/390 and z/os Platforms Lindy Mayfield October 2003 SAS/Europe Customer Support Lindy.mayfield@eur.sas.com

More information

CA Vantage Storage Resource Manager CA RS 1509 Service List

CA Vantage Storage Resource Manager CA RS 1509 Service List CA Vantage Storage Resource Manager 12.6 1 CA RS 1509 Service List Release Service Description Type 12.6 RO80191 SUPPORT OF ZEDC IBM COMPRESSION PTF RO80937 HNODE HSM HISTORY %CACHE INCORRECT PTF RO81333

More information

CA Endevor Software Change Manager

CA Endevor Software Change Manager CA Endevor Software Change Manager Footprint Synchronization Guide Version 16.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred

More information

CA IDMS 18.0 & 18.5 for z/os and ziip

CA IDMS 18.0 & 18.5 for z/os and ziip FREQUENTLY ASKED QUESTIONS CA IDMS 18.0 & 18.5 for z/os and ziip Important October 2013 update ziip (IBM System z Integrated Information Processor) is a specialty mainframe processor designed to help free

More information

ISPF Users Boot Camp - Part 2 of 2

ISPF Users Boot Camp - Part 2 of 2 Interactive System Productivity Facility (ISPF) ISPF Users Boot Camp - Part 2 of 2 SHARE 116 Session 8677 Peter Van Dyke IBM Australia SHARE 116, Winter 2011 pvandyke@au1.ibm.com Introduction Our jobs

More information

Installation. Existing XPAF customers. Customers migrating from HFDL

Installation. Existing XPAF customers. Customers migrating from HFDL Revision Date: October 12, 2011 Page 2 Installation This section includes information about installing the XPAF software which includes the XPAF Forms Generator (XFG). Existing XPAF customers Existing

More information

IBM InfoSphere Guardium S-TAP for DB2 on z/os User's Guide. Version9Release1

IBM InfoSphere Guardium S-TAP for DB2 on z/os User's Guide. Version9Release1 IBM InfoSphere Guardium S-TAP for DB2 on z/os User's Guide Version9Release1 ii IBM InfoSphere Guardium S-TAP for DB2 on z/os User's Guide Contents Chapter 1. InfoSphere Guardium S-TAP for DB2 on z/os overview.......

More information

CA NetMaster CA RS 1606 Service List

CA NetMaster CA RS 1606 Service List CA NetMaster 12.1 1 CA RS 1606 Service List Description Type 12.1 RO89031 ADD OPENSSH SUPPORT PTF RO89171 UNABLE TO SPECIFY A FULL EMAIL ADDRESS IN "FROM" OPERAND PTF RO89281 ADD OPENSSH SUPPORT PTF RO89282

More information

Chicago Interface Group, Inc. FastLIST. Administrator Guide. Release 12.0

Chicago Interface Group, Inc. FastLIST. Administrator Guide. Release 12.0 Chicago Interface Group, Inc. FastLIST Administrator Guide Release 12.0 Chicago Interface Group, Inc. 858 West Armitage Avenue #286 Chicago, IL 60614 USA Phone: (773) 524-0998 Fax: (815) 550-6088 Email:

More information

Compuware Maintenance Utility Supplement

Compuware Maintenance Utility Supplement Compuware Maintenance Utility Supplement October 14, 2013 ii Compuware Maintenance Utility Supplement Please direct questions about Compuware Maintenance Utility or comments on this document to: Compuware

More information

CA 1 Tape Management CA RS 1404 Service List

CA 1 Tape Management CA RS 1404 Service List CA 1 Tape Management 12.6 1 CA RS 1404 Service List Description Hiper 12.6 RO63310 TMSSVC ABEND999 RC 04 IF CA 1 NOT FULLY ACTIVE. RO63903 CAG8259E OR CAL0999E ISSUED WITH TQS INSTALLED. RO63970 TMS0XF1

More information

CA JCLCheck Workload Automation

CA JCLCheck Workload Automation CA JCLCheck Workload Automation Release Notes Version 12.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Connector Guide for CA ACF2 Advanced Release 9.0.4

Connector Guide for CA ACF2 Advanced Release 9.0.4 [1]Oracle Identity Manager Connector Guide for CA ACF2 Advanced Release 9.0.4 E10423-17 August 2018 Oracle Identity Manager Connector Guide for CA ACF2 Advanced, Release 9.0.4 E10423-17 Copyright 2013,

More information

LMS. Laret Melsch Systems

LMS. Laret Melsch Systems LMS Laret Melsch Systems Manage and Automate Dynamic Allocation of STEPLIBs and ISPF Libraries is the premier solution to manage and automate dynamic allocation of STEPLIB and ISPF libraries to save time,

More information

IBM. MVS Installation Exits. z/os. Version 2 Release 3 SA

IBM. MVS Installation Exits. z/os. Version 2 Release 3 SA z/os IBM MVS Installation Exits Version 2 Release 3 SA23-1381-30 Note Before using this information and the product it supports, read the information in Notices on page 415. This edition applies to Version

More information

IBM. Candle OMEGAMON Platform. Configuring IBM Tivoli Candle Management Server on z/os. Tivoli. Version 360 GC

IBM. Candle OMEGAMON Platform. Configuring IBM Tivoli Candle Management Server on z/os. Tivoli. Version 360 GC Tivoli Candle OMEGAMON Platform IBM Version 360 Configuring IBM Tivoli Candle Management Server on z/os GC32-9414-02 12 1 2 Tivoli Candle OMEGAMON Platform IBM Version 360 Configuring IBM Tivoli Candle

More information

CA Endevor Software Change Manager

CA Endevor Software Change Manager CA Endevor Software Change Manager Parallel Development WIP Merge Enhancement r12 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for

More information

Can IBM Debug Tool and RDz Integrated Debugger both coexist in same CICS region?

Can IBM Debug Tool and RDz Integrated Debugger both coexist in same CICS region? Can IBM Debug Tool and RDz Integrated Debugger both coexist in same CICS region? With v9.1.1, the Integrated Debugger feature introduced a common adapter which made it possible for both IBM Debug Tool

More information

z/os Operating System Vulnerabilities ( )

z/os Operating System Vulnerabilities ( ) ARTICLE z/os Operating System Vulnerabilities (2013-2017) Cynthia Overby March 2, 2018 z/os Operating System Vulnerabilities (2013-2017) 01 Mainframe Integrity Vulnerabilities Key Resources, Inc. (KRI)

More information

How to Go About Setting Mainframe Security Options

How to Go About Setting Mainframe Security Options How to Go About Setting Mainframe Security Options Stu Henderson stu@stuhenderson.com 5702 Newington Road Bethesda, MD 20816 www.stuhenderson.com (301) 229-7187 ABSTRACT 2 If you don't think that checklists

More information

CA TPX Session Management

CA TPX Session Management CA TPX Session Management Message Reference Guide Release 5.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

IBM. Hardware Configuration Definition Messages. z/os and z/vm. Version 2 Release 3 SC

IBM. Hardware Configuration Definition Messages. z/os and z/vm. Version 2 Release 3 SC z/os and z/vm IBM Hardware Configuration Definition Messages Version 2 Release 3 SC34-2668-30 Note Before using this information and the product it supports, read the information in Notices on page 373.

More information

Pervasive Encryption Demo: Guided Tour of Policy-Based Data Set Encryption

Pervasive Encryption Demo: Guided Tour of Policy-Based Data Set Encryption Pervasive Encryption Demo: Guided Tour of Policy-Based Data Set Encryption Eysha S. Powers IBM, Enterprise Cryptography November 2018 Session FF About me IBM Career (~15 years) 2004: z/os Resource Access

More information

CA JCLCheck Workload Automation CA RS 1411 Service List

CA JCLCheck Workload Automation CA RS 1411 Service List CA JCLCheck Workload Automation 12.0 1 CA RS 1411 Service List Description Type 12.0 RO73100 INCORRECT MESSAGE CAY6077E FOR EMPTY GDG BASE DSN PTF RO73180 VARIOUS PROBLEMS WITH SOME DFSORT KEYWORDS PTF

More information

CA JCLCheck Workload Automation

CA JCLCheck Workload Automation CA JCLCheck Workload Automation Tutorial Version 12.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Tivoli Workload Scheduler for z/os Nested Dependent Variables

Tivoli Workload Scheduler for z/os Nested Dependent Variables Tivoli Workload Scheduler for z/os Nested Dependent Variables This document can be found on the web at www.ibm.com/support/techdocs Search for author s name under the category of White Papers. Version

More information