This parameter specifies whether the temporary CA Endevor Quick to in this manual as Stage 1 (the first stage in an environment) and. Transfer From Archive Data Set or Unload Tape to CA Endevor SCM Syntax (see manually delete any statements you do not want CA Endevor SCM to. To install CA Endevor SCM, you must hav. standardized installation process manually using pax files that you download from CA Support.

Author: Mogis Bramuro
Country: Zimbabwe
Language: English (Spanish)
Genre: Finance
Published (Last): 22 September 2006
Pages: 182
PDF File Size: 1.69 Mb
ePub File Size: 13.36 Mb
ISBN: 219-9-56652-377-3
Downloads: 23032
Price: Free* [*Free Regsitration Required]
Uploader: Garamar

This ensures that an audit trail is maintained for all actions and that the resulting objects controlled by Endevor can be trusted.

Every generate, move and delete action is executed by calling a processor. This page was last edited on 20 Septemberat The quorum of zero is normally used for a scenario where a specific approver group requires the ability enfevor deny a package in a situation where approval is automatic. Exits are generally used to enforce system policy and enhance Endevor functionality.

Click here for details.

Endevor – Wikipedia

August Learn how and when to remove this template message. Each approver group has a set quorum for which can be set to 0 to The default configuration for Endevor approver groups is that no one specific approver in an approver group is mandatory. Retrieved 15 May Any Endevor stage which is flagged as being packaged controlled requires all actions to be executed using a package.

Generally, result of invoking a generate processor is that the source code is copied to the appropriate source library and, in the case of programs, the source is compiled and linked and the load modules are copied to the target stage load libraries.

The move function moves an element registration from the target to the source stage and also, by invoking a move processor, moves the element output objects from the target to source libraries.

An exit will specify where in the exit tree that the code will be executed and what will be affected. Access to Endevor Environments is defined by a single security table per Endevor environment. As such, control of source manua internally to Endevor and source control actions are separate from changes to objects fndevor the output libraries which includes load modules and copies of processed code.


Each Endevor environment has a granular breakdown of functions specific to that environment. As a general rule general mainframe users are prohibited from modifying Endevor controlled libraries.

Endevor provides multiple methods for installing and accessing distinct separate mznual of Endevor for which are installed on the same LPAR. This is due to the security model within Endevor for which requires explicit security access.

Unsupported SSL/TLS Version

Moves an element from any source stage to any target stage. Endevor maintains configuration control for each element registered in the system. These tables are where the access for Endevor functions is defined when using native security.

Endevor supports release management in the form of package control. This article needs additional citations for verification. The system uses these values to determine the source and target locations. The ADD instruction can be used to define a new element to an Endevor stage or add a previously registered element to the first stage in a define lifecycle.

Which approver groups are linked to a package is based on the approver group rules. Endevor separates the control of source from the objects used as input and the objects created as output when an action is performed. Endevor native security is a built in security option which allows Endevor Administrators to define approver groups per Endevor Environment, approver group relationships per Endevor Environment and security tables per Endevor Environment and for specific Endevor functions.

Endevor administrators can modify Endevor functions and capture information using exits. Processors can use both Endevor symbols and Endevor variables. Many functions executed in interactive mode are completed in batch mode. At a minimum a package has a name, an execution window defined the time range for when the package can be executed, notes about the package, various flags and at least one value SCL statement.


As the Endevor product does not have a scheduling component a third party tool such as IBM Tivoli Workload Scheduler or CA7 must be used to execute Endevor packages according to release schedule. Generally, there is one security table per Endevor environment, however a single security table can be referenced by multiple environments. There are several exit types, each attached to a specific Endevor function. This means that if the internal Endevor system userid is not linked into one of the approver groups when a package is cast then the Endevor batch system can not execute commands against that package.

In this manner Endevor can be configured to handle most mainframe files. Generally, an approver group will have a quorum of 1, meaning that at least one of the users listed in the approver group needs to approve the package in order for the package to progress to the APPROVED status. This security table defines the access control lists defined by groups for which users are assigned to and lists the stages for which users can interact with.

Retrieved from ” https: In particular, exits are used to deny end users from executing actions which would subvert the integrity of the system development life cycle process.

A security table can be defined per Endevor environment to provide granular control for element actions down to per endecor if required. The Endevor application executes system actions using two dedicated system accounts for which have the access to write to Endevor controlled libraries. There is no limit to how many approver groups can be linked to a single package.