ALERT: Some images may not load properly within the Knowledge Base Article. If you see a broken image, please right-click and select 'Open image in a new tab'. We apologize for this inconvenience.

When allocating an encrypted dataset, how to verify the allocated dataset is encrypted?

book

Article ID: 226458

calendar_today

Updated On:

Products

ACF2 Top Secret

Issue/Introduction

After allocating an encrypted(pervasive encryption) dataset, how can someone verify that the dataset was allocated successfully as an encrypted dataset?

Resolution

Successful allocation of an encrypted dataset will typically generate an IGD17150I message specifying the dataset name and encryption key label("handle"), for example:

IGD17150I DATA SET PAYROLL.TEST.ENCRYPT.DATA IS  ELIGIBLE FOR ACCESS METHOD ENCRYPTION. KEY LABEL  IS (TEST.KEY001

Also, an IDCAMS LISTCAT can be used to verify that a dataset is encrypted, the LISTCAT output will show DATA SET ENCRYPTION YES|NO and the DATA SET KEY LABEL, for example:

ENCRYPTIONDATA

        DATA SET ENCRYPTION----(YES)
        DATA SET KEY LABEL-----TEST.KEY001