Pervasive Encryption Setup Commands /Jobs in Top Secret
search cancel

Pervasive Encryption Setup Commands /Jobs in Top Secret

book

Article ID: 220169

calendar_today

Updated On:

Products

Top Secret

Issue/Introduction

 Commands/jobs needed to setup pervasive encryption.   

Environment

Release : 16.0

Component : CA Top Secret for z/OS

Resolution

Prior to setting up Pervasive Encryption(PE) a key is needed.  Keys are not created in Top Secret but you can create them in ICSF.

 

There are four Jobs that need to be run:

  • First job sets up the TSS commands.
  • Second job initializes the dataset
  • Third job fills the empty dataset which causes the encryption to occur.
  • Fourth job does a listcat on the dataset which will show ENCRYPTED(YES) as one of the attributes.

    Acid names in the below jobs can be changed.

JOB 1:
//CREATEID     JOB (EEE),'B',                
//   USER=TSSadminid,                                 
//   PASSWORD=TSSadminpass,                             
//   NOTIFY=TSSadminid,                               
//   CLASS=A,MSGCLASS=X                             
//*                                                
//**                                               
//EAQTMP       EXEC     PGM=IKJEFT01,REGION=1024K  
//SYSPRNT      DD       SYSOUT=*                   
//SYSTSPRT     DD       SYSOUT=*                   
//SYSTSIN      DD       *                          
TSS CRE(TESTUSR1) NAME(TESTUSR1) TYPE(USER) PASS(pass,,0) DEPT(somedept)
TSS CRE(TESTUSR2) NAME(TESTUSR2) TYPE(USER) PASS(pass,,0) DEPT(somedept)
TSS ADD(TESTUSR1) CSFKEYS(TEST.KEY001)
TSS ADD(TESTUSR1) DSN(TESTUSR2.TEST.PE)
TSS ALTADD(TESTUSR1) DSN(TESTUSR2.TEST.PE) DSKEY(TEST.KEY001)
TSS PER(TESTUSR2) CSFKEYS(TEST.KEY001) SYMCPACFRET(YES) -
SYMCPACFWRAP(YES) ACCESS(READ) CRITERIA(SMS(DSENCRYPTION))
TSS PER(TESTUSR2) DSN(TESTUSR2.TEST.PE) ACC(ALL)
TSS PER(ALL) IBMFAC(STGADMIN.SMS.ALLOW.DATASET.ENCRYPT) ACC(NONE)
TSS PER(ALL) IBMFAC(STGADMIN.SMS.FAIL.INVALID.DSNTYPE.ENC) ACC(NONE)
TSS PER(TESTUSR2) DSN(TESTUSR2.TEST.PE) ACC(ALL)

JOB 2:
//ALLOC JOB (118300000,CU03),'CU03-R3330,BOSTIC',CLASS=B,   
//  MSGCLASS=X,USER=TESTUSR2,NOTIFY=TESTUSR2                     
//GNR      EXEC  PGM=IEFBR14                                    
//SYSUT2   DD DSN=TESTUSR2.TEST.PE,UNIT=3390,STORCLAS=PRIMARY,  
//            SPACE=(TRK,(5,5)),DISP=(,CATLG,DELETE),          
//            DSNTYPE=EXTREQ,                                  
//            DCB=(RECFM=FB,LRECL=80,BLKSIZE=6400)             
/*          

JOB 3:
//COPY     JOB (118300000,CU03),'CU03-R3330,BOSTIC',CLASS=B,   
//  MSGCLASS=X,NOTIFY=TESTUSR2,USER=TESTUSR2                    
//GNR     EXEC  PGM=IEBGENER                                  
//SYSPRINT DD SYSOUT=*                                  
//SYSIN DD DUMMY                                               
//SYSUT1   DD DISP=SHR,DSN=SYS1.PROCLIB(TSS15)                
//SYSUT2   DD DISP=SHR,DSN=TESTUSR2.TEST.PE                                                                  

JOB 4:
//LISTCAT JOB (118300000,CU03),'CU03-R3330,BOSTIC',CLASS=B,
//  NOTIFY=TESTUSR2,MSGCLASS=X                              
//* STEP 8: DO A LISTCAT TO VERIFY THE ENCRYPTION INFO     
//*                                                        
//* NOTES (1) CHECK LISTCAT OUTPUT FOR:                    
//*              ENCRYPTIONDATA                            
//*                DATA SET ENCRYPTION ---- (YES)          
//*                DATA SET KEY LABEL ----- TEST.KEY001    
//*                                                        
//LISTCAT  EXEC PGM=IKJEFT01                               
//SYSTSPRT DD   SYSOUT=*                                   
//SYSTSIN  DD   *                                          
   LISTC ENT('TESTUSR2.TEST.PE') ALL                        
/*                                          

  

Additional Information

Implement Data Pervasive Encryption with Top Secret

Pervasive Encryption: Setting up Encryption Keys
https://community.ibm.com/community/user/ibmz-and-linuxone/blogs/lora-milczewski1/2020/03/25/pervasive-encryption-setting-up-data-set-encryption-in-our-environment

https://www.ibm.com/docs/en/zos/2.5.0?topic=encryption-setting-up-zos-data-set