FDRCRYPT & FDRCAMS Technical Details
This section contains examples of FDRCRYPT and FDRCAMS to illustrate how easy
they are to use.
Example 1 – FDRCRYPT: FDR/ABR Backup With CIPHER Encryption
This example shows FDRCRYPT being used during an FDRINC Full-volume backup, where all volumes with volsers beginning with TEST will be backed up. Two copies of the backups will be created - COPY1 will not be encrypted and will stay onsite, COPY2 will be encrypted.
The default CIPHER encryption will be used to reduce CPU (and elapsed time) requirements of the encryption. The optional FDRCRYPT DD has been used to specify that a master key will be used for all the encrypted backups created by this job. The value of this master key will be obtained from the RACF security profile facility FDRCRYPT.ABRBKUP, as directed by the MASTERKEYID keyword.
Example 2 – FDRCAMS: Encrypting A REPRO From A VSAM KSDS
FDRCAMS encryption uses standard IDCAMS JCL, with two minor alterations:
All IDCAMS functions are accepted when executing FDRCAMS. When a REPRO function is invoked, FDRCAMS uses IDCAMS REPRO I/O exits to optionally:
The input file for an encryption, or the output file of a decryption, can be anything supported by REPRO, including sequential data sets, VSAM clusters (keyed and non-keyed), and IAM files.
FDRCAMS can REPRO from any supported file type to an encrypted sequential data set, and can REPRO from an encrypted sequential data set to any supported file type.
Operands on the ENCRYPT or DECRYPT statements in the FDRCRYPT DD input will specify which REPRO functions in the step will invoke encryption or decryption, based on the input or output DD name of the REPRO, or the input or output file name of the REPRO.
In the example below, we are executing FDRCAMS to do a REPRO of a VSAM KSDS out to a sequential file on tape. The data on the sequential output is encrypted with CIPHER encryption.
return to top