View previous topic :: View next topic
|
Author |
Message |
rashisaxena
New User
Joined: 18 Mar 2009 Posts: 1 Location: Chennai
|
|
|
|
Hi,
I want to protect my dataset in such a way that only one particular job can read it.
How can I do this. Please provide your valuable suggestions.
Thanks
Rashi |
|
Back to top |
|
|
enrico-sorichetti
Superior Member
Joined: 14 Mar 2007 Posts: 10873 Location: italy
|
|
|
|
Quote: |
Please provide your valuable suggestions. |
whatever solution we could provide, might not agree with Your organization standards
what is wrong in asking Your support ?
if You have the business need they will be glad to help You in this requirement |
|
Back to top |
|
|
Anuj Dhawan
Superior Member
Joined: 22 Apr 2006 Posts: 6250 Location: Mumbai, India
|
|
|
|
rashisaxena wrote: |
I want to protect my dataset in such a way that only one particular job can read it. |
I'm not sure what made someone to comeup with such a requirement, please help me understand ? |
|
Back to top |
|
|
Pete Wilson
Active Member
Joined: 31 Dec 2009 Posts: 580 Location: London
|
|
|
|
You need to define what you mean by 'protect'. Do you mean via security access, or do you mean in terms of scheduling (e.g. CA7 constraints), disposition in JCL (DISP=OLD), shareoptions in VSAM? |
|
Back to top |
|
|
expat
Global Moderator
Joined: 14 Mar 2007 Posts: 8797 Location: Welsh Wales
|
|
|
|
Maybe another case of the "I don't want my work mates to see what I've done " syndrome ? |
|
Back to top |
|
|
Anuj Dhawan
Superior Member
Joined: 22 Apr 2006 Posts: 6250 Location: Mumbai, India
|
|
|
|
And, I believe you did not mean "How to create password protected dataset?"
Yes?
Password protection is STRONGLY DISCOURAGED nowadays. One reason being, out of many others, it will certainly prevent automated backups. When storage guys encounter password protected datasets from the HSM error report, they'll typically zap the VTOC to remove password protection, and then remove the dataset and then it can not be restored ever.
If it's very necessary, speak with the security support people and follow they guidelines on protecting datasets. |
|
Back to top |
|
|
|