Verify allocation of new Pervasive Encryption Dataset
search cancel

Verify allocation of new Pervasive Encryption Dataset

book

Article ID: 226458

calendar_today

Updated On:

Products

ACF2 Top Secret

Issue/Introduction

After allocating an encrypted(pervasive encryption) dataset, how can someone verify that the dataset was allocated successfully as an encrypted dataset?

Resolution

Successful allocation of an encrypted dataset will typically generate an IGD17150I message specifying the dataset name and encryption key label("handle"), for example:

IGD17150I DATA SET PAYROLL.TEST.ENCRYPT.DATA IS  ELIGIBLE FOR ACCESS METHOD ENCRYPTION. KEY LABEL  IS (TEST.KEY001

Also, an IDCAMS LISTCAT can be used to verify that a dataset is encrypted, the LISTCAT output will show DATA SET ENCRYPTION YES|NO and the DATA SET KEY LABEL, for example:

ENCRYPTIONDATA

        DATA SET ENCRYPTION----(YES)
        DATA SET KEY LABEL-----TEST.KEY001