z/OS DFSMShsm Managing Your Own Data
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


What you do with DFSMShsm

z/OS DFSMShsm Managing Your Own Data
SC23-6870-00

Although DFSMShsm performs most of its functions automatically, you may at times want to perform some of the functions for your data sets by command. DFSMShsm provides a set of commands that unauthorized users can issue to manage their own data sets. SMS provides controls in the management classes that allow or disallow management of data sets by command. If your data sets are associated with a management class that disallows space management or availability management by command, you cannot issue these commands for those data sets. In addition, DFSMShsm provides a command that authorized users can use to issue DFSMShsm commands from TSO.

Many computing centers use security programs to protect users data sets from being deleted, changed, or read by unauthorized people. DFSMShsm honors both password and RACF® protection for data sets.

DFSMShsm provides several ways to perform its tasks but not all ways can be used for every task.
  • Using interactive storage management facility (ISMF) panels
  • Issuing commands through TSO
  • Issuing user macros
  • Using the inline backup facility
You can use DFSMShsm to perform the following tasks for your data sets:
  • Back up a data set
  • Change the data set parameters that affect backup for a particular data set
  • Condense the data set. When you condense a data set, you release excess allocated space in a sequential data set or remove all unused space or invalid data from a partitioned data set.
  • Cancel a request for DFSMShsm services
  • Delete backup versions of a data set
  • Delete a migrated data set
  • Free storage in the common service area (CSA)
  • List DFSMShsm information about your data sets
  • Migrate a data set
  • List information about your requests for DFSMShsm services.
  • Recall a data set
  • Recover a data set
  • Send an authorized command to DFSMShsm

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014