Verify for VTAM Modernization Guide
Verify for VTAM is a 3270 product by Broadcom. Explore technical details, modernization strategies, and migration paths below.
Product Overview
Verify for VTAM automates testing of 3270 applications on z/OS and z/VSE.
The product exposes a REST API with endpoints like `/sessions`, `/scripts`, and `/reports`.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What are the primary benefits of using Verify for VTAM?
Verify for VTAM automates 3270 application testing, reducing manual effort and improving test coverage. It supports regression testing to ensure new code does not break existing functionality and stress testing to evaluate application performance under heavy load.
How does Verify for VTAM automate testing?
Verify for VTAM uses a scripting language to define test cases. These scripts interact with the 3270 application as a user would, sending input and verifying output. Configuration files define connection parameters and application-specific settings.
What are the main components of the Verify for VTAM architecture?
The core components include the Script Engine, which executes test scripts; the VTAM Interface, which handles communication with the 3270 application; and the Reporting Module, which generates test results. These components communicate through internal APIs and message queues.
How does Verify for VTAM handle security?
Verify for VTAM supports LDAP for user authentication and role-based access control (RBAC) to manage user permissions. Data transmitted between components can be encrypted using TLS.
Technical
What are some common commands and configuration files used in Verify for VTAM?
Common commands include CONNECT to establish a VTAM session, SEND to send data to the 3270 screen, RECEIVE to read data from the screen, and VERIFY to check expected output. Configuration files define VTAM LU names and application screen layouts.
What is the syntax for basic operations in Verify for VTAM?
A basic CONNECT command would be: `CONNECT APPLID(your_applid) LUNAME(your_luname)`. A SEND command to send data would be: `SEND STRING('your_data')`. A RECEIVE command to capture screen data would be: `RECEIVE FIELD(field_name)`. A VERIFY command to validate data would be: `VERIFY FIELD(field_name) VALUE('expected_value')`.
What type of API does Verify for VTAM expose?
Verify for VTAM exposes a REST API for remote control and integration. API endpoints include `/sessions` for managing VTAM sessions, `/scripts` for managing test scripts, and `/reports` for retrieving test results. The API supports JSON for data exchange.
How do the main components communicate in Verify for VTAM?
The Script Engine executes test scripts written in a proprietary scripting language. The VTAM Interface uses the VTAM API to communicate with 3270 applications. The Reporting Module stores test results in a VSAM dataset.
Business Value
How does Verify for VTAM provide business value?
By automating testing, Verify for VTAM reduces the time and cost associated with manual testing efforts. It improves application quality by identifying defects early in the development lifecycle, leading to fewer production issues.
How does Verify for VTAM enable faster release cycles?
Verify for VTAM enables faster release cycles by automating regression testing. This ensures that new code changes do not introduce new defects, allowing for more frequent and confident deployments.
How does Verify for VTAM help with regulatory compliance?
The product facilitates compliance with industry regulations by providing comprehensive audit trails of all testing activities. This helps organizations demonstrate adherence to quality standards and regulatory requirements.
Security
What authentication methods are supported by Verify for VTAM?
Verify for VTAM supports authentication via LDAP, allowing integration with existing enterprise directory services. It also supports SAML 2.0 for single sign-on (SSO) capabilities.
What access control model is used by Verify for VTAM?
Verify for VTAM uses role-based access control (RBAC) to manage user permissions. Different roles can be assigned to users, granting them specific privileges to access and modify test scripts, execute tests, and view reports.
What encryption is used by Verify for VTAM and where?
Data transmitted between the Verify for VTAM components and the 3270 applications can be encrypted using TLS. This ensures that sensitive data is protected during transmission.
What audit and logging capabilities exist in Verify for VTAM?
Verify for VTAM provides comprehensive audit logging capabilities. All user actions, including script modifications, test executions, and configuration changes, are logged and can be reviewed for security and compliance purposes.
Operations
What administrative interfaces are available for Verify for VTAM?
Verify for VTAM provides a command-line interface (CLI) for administrative tasks. It also offers a web-based console for managing users, configuring system settings, and monitoring test execution.
How is user management handled in Verify for VTAM?
User management is handled through the administrative interface. Administrators can create user accounts, assign roles, and manage user permissions. Integration with LDAP allows for centralized user management.
What are the main configuration parameters for Verify for VTAM?
Key configuration parameters include VTAM connection settings, application screen layouts, and test script execution parameters. These parameters are typically stored in configuration files.
What monitoring and logging capabilities exist in Verify for VTAM?
Verify for VTAM provides monitoring and logging capabilities to track system performance and identify potential issues. Logs can be configured to capture detailed information about test executions, user activity, and system events.
Ready to Start Your Migration?
Download our comprehensive migration guide for Verify for VTAM or calculate your ROI.