Limited supportBMC provides limited support for this version of the product. As a result, BMC no longer accepts comments in this space. If you encounter problems with the product version or the space, contact BMC Support.BMC recommends upgrading to the latest version of the product. To see documentation for that version, see BMC AMI Ops Monitor for CMF 6.3.

Using CMF MONITOR components


Now that you have completed Manual-customization for CMF MONITOR, you can either make more customization changes to CMF MONITOR or begin using any of its three components:

  • CMF MONITOR Online
  • CMF MONITOR batch
  • CMFMON

Using CMF MONITOR Online 

After completing the customization steps, to begin using CMF MONITOR Online, you must start the required address spaces (CAS and PAS).

See Administering for more CAS and PAS startup instructions.

After starting these address spaces, you can begin using CMF MONITOR Online, and you will be able to take advantage of all its features if you perform further modifications. The following list describes the optional customization steps that you can perform to take full advantage of the CMF MONITOR Online features:

  • Complete the customization steps for defining the connections for cross-systems communication between multiple CASs on multiple systems.
    See Overview of MainView Customization for more information about defining the definitions for cross-systems communication.

  • Complete the customization steps for defining target definitions for monitoring communication links among the active system and CASs and products on different systems.
    See Administering for more information about defining target definitions for CAS communication monitoring.

  • Complete customization steps for defining the appropriate security checks for access to systems, products, view tables, and view or product actions.

Securing CMF MONITOR

The MainView environment works with your IBM RACF, CA Technologies CA-TOP SECRET, or CA Technologies CA-ACF2 security package to control access to view data.

For information about using the security views and how the views interact with your security package, see Managing security for MainView products. In addition, consider the following information:

  • Security for CMF MONITOR Online and for the cross-system data APIs is implemented through two views: SERDEF and SERDEFL.
  • When you display SERDEF, you will see that CMF MONITOR Online has defined a separate resource rule for:
    • View data in general
    • Data provided by each view table
    • CMF XDS API actions
  • view table is a family of views that display the same type of data. To find out which views are associated with a particular view table, see Overview of windows-mode security.

    Note

    Individual views cannot be secured. That is, when you grant or deny access to a view table, you grant or deny access to all views that belong to that table.

  • With MainView security, either you can add rules for resources to your security package, using the default class and entity names for the resource, or you can change the class and entity names to conform to rules that you have already defined

    Suppose you have rules defined to your security package to control access to a resource identified by class DATASET and entity name SYS1.PROCLIB. You want to use the same rule to control access to MainView Address Space Table Data. Enter the command CHAnge beside the Address Space Table Data entity on SERDEF, and then change the class to DATASET and change the entity to SYS1.PROCLIB. MainView uses your SYS1.PROCLIB rules for Address Space Table Data.

Further reading

After completing any additional customization steps, you can learn how to use CMF MONITOR Online by referring to Using CMF MONITOR Online.

Using the batch component

Although you can begin using the CMF MONITOR batch component as soon as you complete the customization steps, you might want to make some additional modifications.

The following list describes the optional modifications available for this component:

After making the desired modifications, you can learn about using the batch component of CMF MONITOR by referring to Generating-and-managing-batch-reports.

Using CMFMON

Before using the CMFMON component, you might want to use your External Security Manager (ESM) to protect your screens.

If you are using an ESM such as IBM RACF or CA Technologies CA-Top Secret or CA-ACF2, you can protect the following program names, which all begin with the letters CMF. The last part of each name corresponds to the CMFMON screen that you are protecting.

CMFAPF

CMFCHAN

CMFLPA

CMFARD

CMFDEV

CMFLNK

CMFARDJ

CMFDEVV

CMFPGSP

CMFASD

CMFENQR

CMFSENQ

CMFASDJ

CMFHFS

CMFSPAG

CMFASRM

CMFILOCK

CMFXDSA

CMFASRMJ

CMFIOQ

CMFXDSP

You can protect the following program names, which all begin with the letters CMH. The last part of each name corresponds to the CMFMON Historical Data screen that you are protecting.

CMHARD

CMHDEV

CMHARDJ

CMHDEVV

CMHASD

CMHSRCS

CMHASDJ


There are no additional customization steps for CMFMON. To learn how to use CMFMON, see Using-CMF-MONITOR-CMFMON.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*