Broadcom z/OS

CA Alchemist Modernization Guide

Source CodeChange Management

CA Alchemist is a source code product by Broadcom. Explore technical details, modernization strategies, and migration paths below.

Product Overview

CA Alchemist is a software change management (SCM) system designed for the z/OS platform.

The system is administered through command-line interfaces (CLIs) and ISPF panels.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

How does CA Alchemist manage software changes?

CA Alchemist manages software changes through a repository-based system. It tracks versions of source code, configuration files, and other artifacts. Changes are typically managed through check-in/check-out operations.

What are the most common operations performed in CA Alchemist?

Common operations include CHECKOUT (to retrieve a file for editing), CHECKIN (to submit changes), UPDATE (to synchronize a workspace), DIFF (to compare versions), and HISTORY (to view the change log).

What type of database or storage mechanism does CA Alchemist use?

CA Alchemist uses a mainframe-based repository. The specific database or storage mechanism is typically a VSAM or DB2 database on z/OS.

How is user management handled in CA Alchemist?

User management is handled through the z/OS security system (RACF, ACF2, or Top Secret). Access to Alchemist resources is controlled through these security systems.

Technical

What are the main system components of CA Alchemist?

The core components include the Alchemist Repository (where versions are stored), the Alchemist Server (which manages requests), and the Alchemist Client (used by developers).

How do the components communicate with each other?

The Alchemist client communicates with the Alchemist server using a proprietary protocol over TCP/IP. The server interacts with the z/OS system and the repository database.

What is the syntax for basic operations?

Basic operations include CHECKOUT filename, CHECKIN filename, UPDATE filename, DIFF filename version1 version2, and HISTORY filename.

What administrative interfaces are available?

CA Alchemist primarily uses a command-line interface (CLI) for most operations. Configuration is often done through ISPF panels or by directly editing configuration files.

What authentication methods are supported?

Alchemist uses the underlying z/OS security system for authentication. This typically involves RACF, ACF2, or Top Secret. Access control is based on the permissions defined in these systems.

Business Value

What is the business value of using CA Alchemist?

CA Alchemist provides a centralized repository for managing changes, ensuring consistency and traceability. This reduces errors and improves the reliability of software releases.

How does CA Alchemist improve developer productivity?

By automating change management processes, CA Alchemist reduces the manual effort required for tracking and coordinating changes. This frees up developers to focus on other tasks.

How does CA Alchemist help with compliance?

Alchemist's audit trails and reporting capabilities help organizations meet compliance requirements by providing a record of all changes made to the system.

Security

What authentication methods are supported by CA Alchemist?

Authentication is handled through z/OS security systems such as RACF, ACF2, or Top Secret. These systems provide robust authentication and authorization capabilities.

What access control model is used by CA Alchemist?

CA Alchemist leverages the access control mechanisms provided by z/OS security systems (RACF, ACF2, Top Secret). These systems use an ACL-based model.

What encryption is used by CA Alchemist?

Data at rest within the Alchemist repository can be encrypted using z/OS encryption facilities. Data in transit is typically not encrypted unless the underlying network protocols provide encryption.

What audit/logging capabilities exist in CA Alchemist?

CA Alchemist provides audit logging capabilities that track all changes made to the system. These logs can be used to monitor activity and identify potential security breaches.

Operations

How is CA Alchemist administered?

CA Alchemist is administered through a combination of command-line interfaces (CLIs) and ISPF panels. Configuration files can also be directly edited.

What monitoring capabilities exist in CA Alchemist?

Monitoring is typically done through z/OS system monitoring tools and by reviewing Alchemist's audit logs. These logs provide information about system activity and potential issues.

What are the main configuration parameters for CA Alchemist?

Configuration parameters are typically set through ISPF panels or by editing configuration files. These parameters control various aspects of Alchemist's behavior.

Ready to Start Your Migration?

Download our comprehensive migration guide for CA Alchemist or calculate your ROI.

Calculate ROI