Upgrading Top Secret release 15.0 to release 16.0

Document ID : KB000009988
Last Modified Date : 14/02/2018
Show Technical Document Details

Upgrading from Top Secret Release 15 to Release 16

Important! This upgrade should be performed by the system programmer who is authorized to install, maintain, deploy, and configure products on your system.

Follow these steps:

  1. Prepare for the installation:
    1. Review the installation requirements (including software/hardware/storage/configuration requirements).
    2. Review the product enhancements for Version 16.
    3. (For JES(NOVERIFY) users who use Network Job Entry to execute jobs at remote nodes) Properly authorize inbound or outbound networking jobs so that all work entering or leaving your node complies with your site's security policy.
  2. Receive and apply preventive maintenance.
  3. Assign a unique encryption key to the CA Top Secret CAKOLINK library.
  4. Authorize the Version 16 product libraries (CAKOLINK and CAKOLPA).
  5. (If not using the same CA Top Secret files from Version 15) Create files for your environment as needed:
    1. Create the new parameter file to specify control options.
      Note: No control option changes are required for Version 16.
    2. Create the primary security file and backup security file.
    3. Create the audit/tracking file.
    4. Create the recovery file.
    5. Edit the TSS started task procedure to reflect the updates to your files.
    6. Edit the TSSB backup started task procedureto reflect the updates to your files.
  6. (If using the TSSINSTX exit from the previous release) Reassemble and relink the TSSINSTX exit by using the following libraries:
    1. Version 16 CAKOMAC0 and CAKOSRC0 libraries
    2. SYS1.MACLIB library (required only when you are upgrading z/OS)
    3. SYS1.HASPSRC library (required only when you are upgrading JES)
    4. SYS1.AMODGEN library (required only when you are upgrading z/OS)
  7. Perform an IPL, then start CA Top Secret.
  8. Perform the following post-upgrade verification:

    • Verify that all started tasks initialized properly. 

    • Verify that critical administration ACIDs can still sign on to address spaces as they did in the previous version of the product.

    • List the digital certificates and keyrings (to ensure they were properly converted to the VSAM file):