Systems OS/VS2 MVS Data Management

Total Page:16

File Type:pdf, Size:1020Kb

Systems OS/VS2 MVS Data Management GC26-3875-0 File No. 8370-30 OS/VS2 MVS Data Management Systems Services Guide Release 3.8 Page of GC26-3875-O Revised June 29, 1979 By TNL GN26-0944 First Edition (November 1976) I This edition, as amended by technical newsletters GN26-0944 and GN26-0915, applies to Release 3.8 of OS/VS2 MVS and to any subsequent releases until otherwise indicated in new editions orl technical newsletters. The changes for this edition are summarized under "Summary of Amendments" following the preface. Specific changes are indicated by a vertical bar to the left of the change. These bars will be deleted at any subsequent republication of the page affected. Editorial changes that have no technical significance are not noted. Changes are periodically made to the information herein; before using this publication in connection with the operation of IBM systems, consult the latest IBM System/370 Bibliography, GC2(M)()01, for the editions that are applicable and current. Publications are not stocked at the address given below; requests for IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for readers' comments is provided at the back of this pUblication. If the form has been removed, comments may be addressed to IBM Corporation, P.O. Box 50020, Programming Publishing, San Jose, California U.S.A. 95150. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation whatever. You may, of course, continue to use the information you supply. © Copyright International Business Machines Corporation 1976 PREFACE This book describes all IBM data management except for VSAM (virtual storage access method) and specialized applications such as the time sharing option (TSO), graphics, teleprocessing, optical character readers, optical reader-sorters, and magnetic character readers. These specialized applications are described in separate publications that are listed in IBM System/370 Bibliography,GC20-0001. To learn about VSAM or to write programs that create and process VSAM data sets, refer to: .. Planning for Enhanced VSAM Under OS/VS, GC26-3842, which introduces VSAM and describes its concepts and functions. • OS/VS Virtual Storage Access Method (VSAM) Programmer's Guide, GC26-3838, which describes how to create VSAM data sets and code the macro instructions required to process them. • OS/VS2 Access Method Services, GC26-3841, describes the service program commands used to manipulate VSAM data sets. • OS/VS Virtual Storage Access Method (VSAM) Options for Advanced Applications, GC26-3819, which describes applications not required in the normal use of VSAM. If you know how to write assembler-language programs and use job control statements, you can use this book and OS/VS2 MVS Data Management Macro Instructions, GC26-3873, to write programs that create and process data sets. To use this book you must have basic knowledge of the operating system as contained in OS/VS2 Release 3 Guide, GC28-0770; of assembler language as described in OS/VS-DOS/VS-VM/370 Assembler Language, GC33-4010; and of job control language (JCL) as explained in OS/VS2 JCL, GC28-0692. This book has three parts: "Part 1: Introduction to Data Management" introduces you to the characteristics of data· sets, how you name them, how the system catalogs them, and how you format the records in them. The format of tracks on a direct-access storage device is explained briefly. Part 1 also describes the data control block (DCB) andthe information it supplies to the operating system. Special processing routines that you specify in the DCB macro instruction are also explained in this section. In "Part 2: Data Management Processing Procedures" there is an explanation of data-processing techniques that includes the macro instructions for the queued access technique and the basic access technique and the macro instructions for analyzing input and output errors. The section on data-processing techniques also tells how to select an access method and how to begin and end processing of a data set. The section "Buffer. Acquisition and Control" in Part 2 explains three different methods you can use to obtain buffers and the macro instructions you use with each method. This section also describes ways to control buffers: simple buffering for the queued access technique, direct buffering and dynamic buffering for the basic access technique. In addition, for the queued access technique, there is an explanation of the four modes of moving the records in virtual storage: move mode, data mode, locate mode, and substitute mode. Macro instructions for controlling buffers are described here, too. The next four sections of Part 2 concern processing data sets of four different types: a sequential data set, a partitioned data set, an indexed sequential data set, and a direct data set. They explain the organization of the data sets and the macro instructions used to process them. In the examples the macro instructions are coded in just enough detail Preface 3 Page of GC26-3875-O Revised June 29, 1979 By TNL GN26-0944 to make the examples clear. For a complete description of the operands and options available, see OS/VS2 MVS Data Management Macro Instructions, GC26-3873. "Part 3: Data Set Disposition and Space Allocation" tells you how to figure the amount of space you need for a data set on a direct-access storage device and how to request that space in your JCL DD statement. You are given special directions for allocating space for a partitioned data set and an indexed sequential data set. Part 3 also tells how to indicate in the JCL DD statement the status of the data set at the beginniIig of and during processing and how to indicate what you want the system to do with the data set when processing has terminated. You also are told how to use the DD statement to route the data set to a system output writer, to concatenate data sets, to catalog data sets, and to protect confidential data sets. Appendix A describes data set labeling. Appendix B explains control characters you can use to control card punches and printers. A glossary of acronyms and abbreviations used in this book and the index follow Appendix B. The following manuals are referred to in the text. • OS/VS Message Library: VS2 System Codes, GC38-1008 • OS/VS Message Library: VS2 System Messages, GC38-1002 • OS/VS2 JCL, GC28-0692 . • OS/VS2 MVS CVOL Processor, GC26-3864 • OS/VS2 MVS Resource Access Control Facility (RACF): General Information Manual, GC28-0722 • OS/VS2 Supervisor Services and Macro Instructions, GC28-0683 • OS/VS2 System Programming Library: Data Management, GC26-3830 • OS/VS2 System Programming Library: Debugging Handbook, Volume 1, GC28-0708 • OS/VS2 System Programming Library: Debugging Handbook, Volume 2, GC28-0709 • OS/VS2 System Programming Library: Debugging Handbook, Volume 3, GC28-0710 • OS/VS2 System Programming Library: Initialization and Tuning Guide, GC28-0681 • OS/VS2 System Programming Library: Sij!rvice Aids, GC28-0633 • OS/VS2 System Programming Library: Supervisor, GC28-0628 • OS/VS2 System ProKramming Library: System Generation Reference, GC26-3792 • IBM 3800 Printing Subsystem Programmer's Guide, GC26-3846 • IBM 3890 Document Processor Machine and Programming Description, GA24-3612 • OS Data Management Services and Macro Instructions for IBM 1419/1275, GC21-5006 • OS and OS/VS Programming Support for the IBM 3505 Card Reader and IBM 3525 Card Punch, GC21-5097 • OS/VS IBM 3886 Optical Character Reader Model 1 Reference, GC24-5101 • OS/VS Mass Storage System (MSS) Planning Guide, GC35-0011 • OS/VS Mass Storage System (MSS) Services: General Information, GC35-0016 4 OS/vst MVS Data Management Services Guide • OS/VS Tape Labels, GC26-3795 • OS/VS Utilities, GC35-0005 In this manual, any references made to an IBM program product are not intended to state. or imply that only IBM's program product may be used; any functionally equivalent program may be used instead. This manual has references to the following IBM program products: • RACF-Resource Access Control Facility Program Number, 5740.. XXH Preface 5 CONTENTS Preface ............................................................................................................................... 3 Figures ............................................................................................................................. 11 Summary Of Amendments................................................................................................ 13 Part 1: Introduction to Data Management ........................................................................ 17 Data Set Characteristics .................................................................................................. 17 Data Set Identification ................................................................................................ 19 Data Set Storage .......................................................................................................... 19 Direct-Access Volumes ........................................................................................... 20 Magnetic-Tape Volumes ......................................................................................... 20 Data Set Record Formats ............................................................................................ 21 Fixed-Length Records ............................................................................................ 22 Variable-Length Records ......................................................................................
Recommended publications
  • IBM System/360 Operating System Sequential Access Methods Program Logic Manual
    Y28-6604-1 Program Logic IBM System/360 Operating System Sequential Access Methods Program Number 3S0S-DM-50B This publication describes the internal logic of the routines of the queued sequen­ tial access method, the basic sequential access method, and the basic partitioned access method of IBM System/360 Operating System. Program Logic Manuals are intended for use by IBM customer engineers involved in program maintenance, and by system pro­ grammers involved in altering the program design. Program logic information is not necessary for program operation and use; therefore, distribution of this manual is limited to persons with program maintenance or modification responsibilities. Restricted Distribution PREFACE This publication describes the sequen­ • Buffer pool management routines that tial access method facilities in IBM Oper­ furnish buffer space in main storage. ating System/360. It describes routines in five categories: PREREQUISITE PUBLICATIONS • Queued sequential access method rou­ tines that cause storage and retrieval Knowledge of the information in the of data records arranged in sequential following publications is required for an order .• understanding of this publication: • Basic sequential access method routines IBM system/360 Operating System: Data that cause storage and retrieval of Management, Form C28-6537 data blocks arranged in sequential order. IB,M Systerol360 Operating System: Intro­ duction to Control Program Logic. Pro­ • Basic partitioned access method rou­ gram Logic Manual, Form Y28-6605 tines that cause storage and retrieval of data blocks in a member of a parti­ tioned data set, and construct entries and search for entries in the directory RECOMMENDED READING of a partitioned data set. The publication IBM System/360 Operating • Executors that operate with System: Control Program SerVices, Form input/output supp~rt routines.
    [Show full text]
  • Mysql Enterprise Monitor 2.0 Mysql Enterprise Monitor 2.0 Manual
    MySQL Enterprise Monitor 2.0 MySQL Enterprise Monitor 2.0 Manual Copyright © 2005, 2011, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle USA, Inc., 500 Oracle Parkway, Redwood City, CA 94065.
    [Show full text]
  • CA MII Data Sharing for Z/OS CA MII Programming Guide
    CA MII Data Sharing for z/OS CA MII Programming Guide Release 12.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation is proprietary information of CA and may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. If you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
    [Show full text]
  • Enhance Your COBOL Applications with C-Treertg COBOL Edition
    COBOL Edition Enhance Your COBOL Applications with c-treeRTG COBOL Edition c-treeRTG COBOL Edition is a plug & play option that empowers COBOL applications by replacing the native file system of COBOL compilers with a more robust, comprehensive, solution. • FairCom's c-treeRTG COBOL Edition • Implementing RTG COBOL Edition modernizes record-oriented COBOL requires no changes to existing COBOL applications by providing a bridge code, no duplication of data, and no between COBOL and SQL standards, significant architectural changes. Existing thereby opening up their COBOL data to applications benefit from a new file system the web, cloud, and mobile devices. offering transaction processing, enhanced scalability, and recoverability while greatly • RTG COBOL Edition allows users to expanding data availability. leverage and preserve their investments in COBOL by integrating their existing • RTG COBOL Edition brings instant value COBOL applications with a modern and lowers risk by enabling users to database that preserves the performance immediately start a phasing migration and benefits of COBOL, while conforming project to a new COBOL platform instead to industry standards. of a "big bang," high risk, all-or-nothing conversion Seamless Solution for COBOL Applications This plug & play solution allows your COBOL applications to immediately benefit from the following: • Robust data management: c-treeRTG • User access: Control user access and COBOL Edition Server provides several high- permissions, view current connections, and availability features, such as full transaction see files that are being accessed by specific log, automatic recovery, and limited dynamic users to prevent ghost locks. dump for integrated backup capabilities. • Security: Natively implemented data • Full administrative tools set: Allows you to encryption ranges from simple masking to monitor, manage, configure, and fine-tune advanced encryption.
    [Show full text]
  • Introduction to the New Mainframe: Z/OS Basics
    Front cover Introduction to the New Mainframe: z/OS Basics An introduction to mainframe computing on the IBM zSeries platform z/OS concepts and facilities for students and beginners zSeries hardware and peripheral devices Mike Ebbers Wayne O’Brien Bill Ogden ibm.com/ International Technical Support Organization z/OS Basics March 2005 SG24-6366-00 Note: Before using this information and the product it supports, read the information in “Notices” on page -1. First Edition (March 2005) © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface . xvii How this text is organized . xvii How each chapter is organized . xviii Acknowledgements . xix Comments welcome. xxi Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 1-1 1.1 The new mainframe. 1-2 1.2 Evolving architecture . 1-2 1.3 Mainframes in our midst . 1-4 1.4 What is a mainframe? . 1-5 1.5 Who uses mainframe computers?. 1-7 1.6 Factors contributing to mainframe use . 1-8 1.6.1 Reliability, availability, and serviceability. 1-9 1.6.2 Security . 1-10 1.6.3 Scalability . 1-10 1.6.4 Continuing compatibility . 1-11 1.7 Typical mainframe workloads . 1-11 1.7.1 Batch processing. 1-12 1.7.2 Online transactional processing . 1-15 1.8 Roles in the mainframe world . 1-17 1.8.1 Who is the system programmer? . 1-19 1.8.2 Who is the system administrator? .
    [Show full text]
  • IBM Mainframe Utility Programs ­ Wikipedia, the Free Encyclopedia IBM Mainframe Utility Programs from Wikipedia, the Free Encyclopedia
    9/11/2015 IBM mainframe utility programs ­ Wikipedia, the free encyclopedia IBM mainframe utility programs From Wikipedia, the free encyclopedia IBM mainframe utility programs are Utility software supplied with IBM mainframe operating systems such as MVS to carry out various tasks associated with datasets, etc. The following list describes utilities distributed with OS/360 and successors. No VSE or VM utilities are included. Contents 1 History/Common JCL 2 Dataset utilities 2.1 IDCAMS 2.2 IEBCOMPR 2.3 IEBCOPY 2.4 IEBDG 2.5 IEBEDIT 2.6 IEBGENER 2.7 IEBIMAGE 2.8 IEBISAM 2.9 IEBPTPCH 2.10 IEBUPDTE 3 Scheduler utilities 3.1 IEFBR14 4 System utilities 4.1 ICKDSF 4.2 IEHDASDR 4.3 IEHINITT 4.4 IEHLIST 4.5 IEHMOVE 4.6 IEHPROGM 5 Supporting programs 5.1 SORT 5.2 Compilers/Linker 5.3 DFSMS 6 References 7 See also 8 External links History/Common JCL Many of these utilities were designed by IBM users, through the group SHARE, and then modified or extended by IBM from versions originally written by a user. https://en.wikipedia.org/wiki/IBM_mainframe_utility_programs 1/14 9/11/2015 IBM mainframe utility programs ­ Wikipedia, the free encyclopedia These utilities are usually invoked via Job Control Language (JCL). They tend to use common JCL DD identifiers for their data sets: DDNAME Usual function input file for the 'commands' for the utility. Often set to DUMMY if the default action is SYSIN desired SYSUT1 input file SYSUT2 output file SYSUT3 work (spill) file for input (SYSUT1) (often not used) SYSUT4 work (spill) file for output (SYSUT2) (often not used) SYSPRINT output file for printed output from the utility SYSOUT output file for messages from the utility SYSUDUMP output file for a system 'dump' if the program fails Dataset utilities IDCAMS IDCAMS ("Access Method Services") generates and modifies Virtual Storage Access Method (VSAM) and Non­VSAM datasets.
    [Show full text]
  • AN OS/360 MVT TIME-SHARING SUBSYSTEM for DISPLAYS and TELETYPE Lij Gary D
    ,DOCUMENT RESUME ED 082 488 BM 011 457 , _ AUTHOR Schultz, Gary D. 1 TITLE The CHAT System:1)ln OS/360 MVT Time-Sharing Subsystem for Displays and Teletype. Technical Progress Report. INSTITUTION North Carolina Univ., Chapel Hill. Dept. of Computer Science. SPONS AGENCY National Science Foundation, Washington, D.C. REPORT NO UNC-TPR-CAI-6 PUB DATE May 73 NOTE 225p.; Thesis submitted to the Department of Computer Science, University of North Carolina EDRS PRICE MF-$0.65 HC-:-$9.87 DESCRIPTORS Computer Programs; Input Output Devices; *Interaction; *Man Machine Systems;, Masters Theses; Program Descriptions; *Systems DeVelopment; Technical Reports; *Time Sharidg IDENTIFIERS *Chapel Hill Alphanumeric Terminal; CHAT; CRT Display Stations;. OS 360; PI. I; Teletype ABSTRACT The design and operation of a time-sharing monitor are described. It runs under OS/360 MVT that supports multiple application program interaction with operators of CRT (cathode ray tube) display stations and of .a teletype. Key. design features discussed include:1) an interface. allowing application programs to be coded in either PL/I or assembler language; 2) use of the teletype for:subsystem control and diagnostic purposes; and 3)a novel interregional conduit allowing an application program running under the Chapel Hill Alphanumeric Terminal (CHAT)_: monitor to interact--like a terminal operator--with a conversational language processor in another region of the OS/360 installation. (Author) FILMED FROM BEST A7AILABLE COPY University of North Carolina atChapel Hill Department of Computer Science CO -4. CNJ CO THE CHAT SYSTEM: AN OS/360 MVT TIME-SHARING SUBSYSTEM FOR DISPLAYS AND TELETYPE LiJ Gary D.
    [Show full text]
  • Systems Introduction to OS/VS2 Release 2 First Edition (March, 1973)
    GC28-0661-1 File No. S370-34 Systems Introduction to OS/VS2 Release 2 First Edition (March, 1973) This edition is a reprint of GC28-0661{) incorporating some editorial changes. It does not obsolete GC28-0661-O. This edition applies to Release 2 of OS/VS2 and to all subsequent releases until otherwise indicated in new editions or Technical Newsletters. Changes are continually made to the information herein; before using this publication in connection with the operation of IBM systems, consult the latest IBM System/360 and System/370 Bibliography, Order No. GA22-6822, and the current SRL Newsletter. Order No. GN20-0360, for the editions that are applicable and current. Requests for copies of IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for readers' comments is provided at the back of this pUblication. If the form has been removed, comments may be addressed to IBM Corporation, Publications Development, iJepartment 058, Building 706-2, PO Box 390, Poughkeepsie, N.Y. 12602. Comments and suggestions become the property of IBM. © Copyright International Business Machines Corporation 1973 Preface This publication contains introductory information Design Concepts -- shows sequence of operation and about OS/VS2 Release 2, a system control other highlights of system design. program (SCP) that features virtual storage, System Requirements -- lists the basic hardware multiprogramming, multiprocessing, time sharing, requirements. and job entry subsystems. It is assumed that readers have a basic knowledge of programming Compatibility -- points out the major differences systems such as OS/MVT or OS/VS2 Release 1.
    [Show full text]
  • High Level Assembler for Z/OS & Z/VM & Z/VSE: Programmer's Guide
    High Level Assembler for z/OS & z/VM & z/VSE Programmer's Guide Version 1 Release 6 SC26-4941-06 Note Before using this information and the product it supports, be sure to read the general information under “Notices” on page 397. This edition applies to IBM High Level Assembler for z/OS & z/VM & z/VSE, Release 6, Program Number 5696-234 and to any subsequent releases until otherwise indicated in new editions. Make sure that you are using the correct edition for the level of the product. Order publications through your IBM representative or the IBM branch office serving your locality. IBM welcomes your comments. For information on how to send comments, see “How to send your comments to IBM” on page xix. © Copyright IBM Corporation 1992, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ...............ix *PROCESS statement options .......37 Default options ............37 Tables ...............xi Invoking the assembler dynamically .....37 Coding rules .............37 Assembler options ............38 About this document ........xiii ADATA...............39 Who should use this document .......xiii ALIGN ...............39 Programming interface information ......xiii ASA (z/OS and CMS) ..........40 Organization of this document........xiii BATCH...............40 High Level Assembler documents .......xv CODEPAGE .............41 Documents .............xv COMPAT ..............42 Collection kits ............xvi DBCS ...............43 Related publications ...........xvi DECK ...............43 Syntax notation .............xvi DISK (CMS) .............44 DXREF ...............44 How to send your comments to IBM xix ERASE (CMS) ............45 If you have a technical problem .......xix ESD................45 EXIT................46 Summary of changes ........xxi FLAG ...............48 FOLD ...............51 Chapter 1.
    [Show full text]
  • EREP User's Guide
    Environmental Record Editing and Printing Program (EREP) Version 3 Release 5 User’s Guide IBM GC35-0151-30 Note Before using this information and the product it supports, read the information in “Notices” on page 87. This edition applies to Version 3 Release 5 of EREP and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1983, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures...................................................................................................... vii List of Tables........................................................................................................ ix About this document.............................................................................................xi Who Should Read This Publication............................................................................................................. xi Organization and Contents..........................................................................................................................xi z/OS information.........................................................................................................................................xii How to send your comments to IBM.....................................................................xiii If you have a technical problem................................................................................................................xiii
    [Show full text]
  • Computer Labs for the Introduction to the New Mainframe: Z/OS Basics
    Computer Labs for the Introduction to the New Mainframe: z/OS Basics course Instructor Version The following labs are from the Introduction to the New Mainframe: z/OS Basics course/Redbook. These labs have been run and tested using the computer hub at Marist College in Poughkeepise, NY. You may need to adjust these labs to run on a computer system other than the one at Marist College. Chapter 2 Exercises (Section 2.16) ........................................................................................ 4 To display the CPU configuration ...................................................................................... 4 To display the page data set usage ..................................................................................... 4 To display information about the current Initial Program Load (IPL) ............................... 4 Instructor Notes .................................................................................................................. 4 Chapter 4 Exercises (Section 4.7) .......................................................................................... 5 4.7.1 Logging on to z/OS and entering TSO commands ................................................... 5 4.7.2 Navigating through the ISPF menu options .............................................................. 5 4.7.3 Using the ISPF editor ................................................................................................ 6 4.7.4 Using SDSF ..............................................................................................................
    [Show full text]
  • Wwpass External Authentication Solution for IBM Security Access Manager 8.0
    WWPass External Authentication Solution for IBM Security Access Manager 8.0 Setup guide Enhance your IBM Security Access Manager for Web with the WWPass hardware authentication IBM Security Access Manager (ISAM) for Web is essentially a "reverse Web-proxy" which guards access to a number of enterprise Web services. In its basic form, users authenticate into ISAM protected resources with login / password pairs. This kind of authentication is vulnerable to multiple well-known attacks. At the same time user names and passwords are always a compromise between simplicity and security. ISAM comes with rigorous password policy, thus insisting on secure and hard to remember passwords. WWPass External Authentication Solution (EAS) provides strong hardware authentication and at the same time removes username/password pairs completely. WWPass EAS is a Web service which utilizes ISAM External Authentication Interface (EAI) and is to be installed and configured as an ISAM External Authenticator junction. -- When user authenticates at ISAM server, the request is transparently rerouted to WWPass Web application. On success, ISAM gets user DN (distinguished name) and forwards user to destination Web resource. ISAM / WWPass external authentication architecture WWPass Corporation 1 ISAM / WWPass external authentication message flow 1. User tries to access protected resource 2. ISAM WebSeal intercepts and redirects user request to WWPass authentication server. User is presented WWPass web page. 3. User clicks on "Login with WWPass" button and starts WWPass
    [Show full text]