SDS z/OS

E-Business Server Modernization Guide

EncryptionFiles and Datasets

E-Business Server is a encryption product by SDS. Explore technical details, modernization strategies, and migration paths below.

Product Overview

E-Business Server is a multi-platform utility designed to encrypt and decrypt datasets using PGP encryption.

The system supports integration through APIs, allowing it to be incorporated into existing data processing workflows.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What is E-Business Server and what does it do?

E-Business Server is a utility for encrypting and decrypting datasets. It uses PGP encryption to protect sensitive data at rest. It supports various platforms, including z/OS.

What are the most common operations performed with E-Business Server?

Common operations include encrypting a dataset, decrypting a dataset, generating encryption keys, and managing keyrings. The specific commands depend on the interface used (e.g., command-line or ISPF panels).

How is E-Business Server administered?

E-Business Server can be administered through a command-line interface (CLI) or ISPF panels on z/OS. Configuration parameters are typically stored in configuration files.

What authentication and access control methods are supported?

E-Business Server supports various authentication methods, including LDAP, RACF (on z/OS), and certificate-based authentication. Access control is typically managed through role-based access control (RBAC).

Technical

What are the main system components and how do they communicate?

The core components include the encryption engine, key management module, and interface components (CLI, ISPF). These components communicate through internal APIs and message queues. Data is stored in datasets and keyrings.

What types of APIs does E-Business Server expose?

E-Business Server exposes APIs for encryption and decryption operations. These APIs can be accessed through programming languages like COBOL, Assembler, and Java. Communication protocols include TCP/IP and potentially others depending on the platform.

What is the syntax for basic encryption and decryption operations?

Basic encryption syntax (example): `EBSENCRYPT INPUT(input.dataset) OUTPUT(output.dataset) KEY(keyname)`. Decryption syntax (example): `EBSDECRYPT INPUT(encrypted.dataset) OUTPUT(decrypted.dataset) KEY(keyname)`.

What databases or storage mechanisms are used?

E-Business Server uses datasets and keyrings for storage. The specific format of these depends on the platform (e.g., VSAM datasets on z/OS).

Business Value

What is the business value of using E-Business Server?

E-Business Server protects sensitive data at rest, reducing the risk of data breaches and ensuring compliance with data security regulations. Encryption helps maintain data confidentiality and integrity.

How does E-Business Server help with regulatory compliance?

By encrypting sensitive data, E-Business Server helps organizations meet regulatory requirements such as GDPR, HIPAA, and PCI DSS. Encryption is a key control for protecting personal and financial information.

How does E-Business Server integrate into existing workflows?

E-Business Server can be integrated into existing data processing workflows to provide seamless encryption and decryption capabilities. This reduces the need for manual intervention and improves overall efficiency.

Security

What authentication methods are supported?

E-Business Server supports authentication methods such as LDAP, RACF (on z/OS), and certificate-based authentication. These methods ensure that only authorized users can access encryption and decryption functions.

What encryption algorithms are used?

E-Business Server uses encryption algorithms such as AES and Triple DES to protect data at rest. PGP encryption is used to encrypt datasets and keyrings.

What audit and logging capabilities exist?

E-Business Server provides audit logging capabilities to track encryption and decryption activities. Logs include user IDs, timestamps, and dataset names. These logs can be used for security monitoring and compliance reporting.

What access control model is used?

E-Business Server employs role-based access control (RBAC) to manage user permissions. Roles are assigned to users, and permissions are granted to roles. This ensures that users only have access to the functions they need.

Operations

What monitoring and logging capabilities exist?

E-Business Server can be monitored using standard system monitoring tools. Logs can be analyzed to identify potential issues and security threats. Performance metrics can be tracked to ensure optimal performance.

How is user management handled?

User management is handled through the administrative interfaces (CLI, ISPF). User accounts can be created, modified, and deleted. User roles and permissions can be assigned.

What are the main configuration parameters?

Configuration parameters include encryption keys, keyring locations, and logging settings. These parameters are typically stored in configuration files.

What ports or network requirements exist?

E-Business Server requires specific ports for communication, depending on the platform and configuration. Ensure that these ports are open and accessible.

Ready to Start Your Migration?

Download our comprehensive migration guide for E-Business Server or calculate your ROI.

Calculate ROI