CA Mainframe Chorus 2.5 1 CA RS 1306 Service List Release Service Description Hiper 2.5 RO54019 NMIPTSSX OVERLAYS STORAGE RO55274 ETJDI003E WHEN DSI SSL ENABLED The CA RS 1306 service count for this release is 2
CA Mainframe Chorus 2.0 2 CA RS 1306 Service List Release Service Description Hiper 2.0 RO54154 NMIPTSSX OVERLAYS STORAGE The CA RS 1306 service count for this release is 1
CA Mainframe Chorus 3 CA RS 1306 Service List for CC2D700 FMID Service Description Hiper CC2D700 RO54154 NMIPTSSX OVERLAYS STORAGE The CA RS 1306 service count for this FMID is 1
CA Mainframe Chorus 4 CA RS 1306 Service List for CC2D740 FMID Service Description Hiper CC2D740 RO54019 NMIPTSSX OVERLAYS STORAGE The CA RS 1306 service count for this FMID is 1
CA Mainframe Chorus 5 CA RS 1306 Service List for CETJ250 FMID Service Description Hiper CETJ250 RO55274 ETJDI003E WHEN DSI SSL ENABLED The CA RS 1306 service count for this FMID is 1
CA Mainframe Chorus 2.5 6 CA RS 1306 - PTF RO54019 Details Release Service Details 2.5 RO54019 RO54019 M.C.S. ENTRIES = ++PTF (RO54019) NMIPTSSX OVERLAYS STORAGE PROBLEM DESCRIPTION: TSS exit NMIPTSSX overlays storage after the workarea of length X'48'. ABEND S0D3 or S0C4 occurs depends on the storage is being used by another program or not available. SYMPTOMS: If the storage following the workarea is a program, ABEND S0D3 may result at a later time. S0D3 results from program check 0013 means a program attempted to execute an SSM instruction (opcode x'80'). IMPACT: Region ABEND. CIRCUMVENTION: None. PRODUCT(S) AFFECTED: CA Mainframe Chorus r2.0 CA Mainframe Chorus r2.5 Star Problem(s): CHRPLT 359 Copyright (C) 2013 CA. All rights reserved. R00006-NMS074-SP1 DESC(NMIPTSSX OVERLAYS STORAGE). ++VER (Z038) FMID (CC2D740) SUP ( TR54019 )
CA Mainframe Chorus 2.5 7 CA RS 1306 - PTF RO55274 Details Release Service Details 2.5 RO55274 RO55274 M.C.S. ENTRIES = ++PTF (RO55274) ETJDI003E WHEN DSI SSL ENABLED PROBLEM DESCRIPTION: When CA Mainframe Chorus is configured to use Secure Socket Layer (SSL) for communication with CA Distributed Security Integration for z/os (CA DSI Server), all logins fail. SYMPTOMS: Login attempts fail, the follow message is returned: Error: ETJDI003E : User authentication failed (Login Error: DSI_passwd_check ERROR - DSI_open failure) Action: Verify that the user name and password are correct. Verify that your account is not locked or expired. If the problem persists, contact your Chorus Administrator. IMPACT: No access to CA Mainframe Chorus. CIRCUMVENTION: Disable SSL from CA Mainframe Chorus to CA DSI Server. Note: CA Mainframe Chorus and CA DSI Server are always on the same LPAR, so all commication is performed using cross memory services. Data never travels on the network. PRODUCT(S) AFFECTED: CA Mainframe Chorus Release 2.5 Star Problem(s): CHRPLT 363 Copyright (C) 2013 CA. All rights reserved. R00117-ETJ025-SP1 DESC(ETJDI003E WHEN DSI SSL ENABLED). ++VER (Z038) FMID (CETJ250) SUP ( RO46865 TR46865 TR55274 ) ++HOLD (RO55274) SYSTEM FMID(CETJ250) REASON (ACTION ) DATE (13056) COMMENT ( Product: CA Mainframe Chorus Release 2.5 Sequence: After applying update Purpose: Change of documented procedure Relevance: If you wish to enable Secure Socket Layer (SSL) communication between CA DSI and CA Mainframe Chorus server. Knowledge Required: Configuration procedures for CA Mainframe Chorus. Access Required: Update access to CETJOPTN(ENV) Steps to Perform: The steps required to configure CA DSI to use Secure Socket Layer (SSL) no longer require you to unpack the self-signed pax file. The revised steps are shown here. 1. Edit the following lines in the ENV member in your_chorus_hlq.cetjoptn. Uncomment them starting with the second line: # For DSI SSL #IJO="$IJO -Dcom.ca.chorus.dsiSSLEnabled=true" #export GSK_HOME=$INSTALL_HOME/CA_axis2c/gskssl #export GSK_KEYRING_FILE=$GSK_HOME/CA_SelfSigned_Server.kdb #export GSK_KEYRING_STASH=$GSK_HOME/CA_SelfSigned_Server.sth #export GSK_KEY_LABEL="Cert for SelfSigned Server" Note: If you do not use the self-signed certificates, modify the noted variables. The variables must point to your certificates in the dsi.env file and in the ENVETJ member for the JBoss server. CA DSI and JBoss are enabled to use the self-signed certificate. 2. CA Chorus for Security and Compliance Management Users only: If you have CA DSI Servers running systems that are configured for use with the Security Command Manager module of the Security Simulation interface, add the following lines to the
Release Service CA Mainframe Chorus 2.5 8 CA RS 1306 - PTF RO55274 Details Details dsi.env file for each of those servers: GSK_KEYRING_FILE={Path to the KEYRING FILE} GSK_KEYRING_STASH={Path to the KEYRING STASH file} GSK_KEY_LABEL=Cert for SelfSigned Server ). BINARY PARM(PATHMODE(0,7,7,5)) SHSCRIPT(CHSSLINS,POST). BINARY PARM(PATHMODE(0,7,7,5),PROGCTL,APF) SYMLINK('./rmtauthz') SYMPATH('./RMTAUTHZ'). TEXT PARM(PATHMODE(0,7,7,5)).
CA Mainframe Chorus 2.0 9 CA RS 1306 - PTF RO54154 Details Release Service Details 2.0 RO54154 RO54154 M.C.S. ENTRIES = ++PTF (RO54154) DESC (NMIPTSSX OVERLAYS STORAGE) /* PROBLEM DESCRIPTION: TSS exit NMIPTSSX overlays storage after the workarea of length X'48'. ABEND S0D3 or S0C4 occurs depends on the storage is being used by another program or not available. SYMPTOMS: If the storage following the workarea is a program, ABEND S0D3 may result at a later time. S0D3 results from program check 0013 means a program attempted to execute an SSM instruction (opcode x'80'). IMPACT: Region ABEND. CIRCUMVENTION: None. PRODUCT(S) AFFECTED: CA Chorus r2.0 CA Chorus r2.5 */. ++VER(Z038) FMID(CC2D700) SUP(TZ58125). */.