CSI International z/OS

zDataConnect Modernization Guide

Files and DatasetsSharing

zDataConnect is a files and datasets product by CSI International. Explore technical details, modernization strategies, and migration paths below.

Product Overview

zDataConnect enables applications running on one z/OS system to transparently access sequential datasets residing on another z/OS system.

zDataConnect integrates with z/OS security systems like RACF, ACF2, and Top Secret for authentication and authorization.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What is the primary function of zDataConnect?

zDataConnect enables applications on one z/OS system to access sequential datasets residing on another z/OS system without requiring modifications to the application code. It intercepts I/O requests and redirects them to the target system.

What communication protocols does zDataConnect use?

zDataConnect uses standard z/OS communication protocols, such as TCP/IP, to establish connections between systems. It leverages existing network infrastructure for data transfer.

Do applications need to be modified to use zDataConnect?

No, zDataConnect is designed to be transparent to applications. It intercepts dataset access requests at the system level, eliminating the need for application code changes.

What types of datasets does zDataConnect support?

zDataConnect supports various sequential dataset organizations, including physical sequential (PS), partitioned datasets (PDS), and extended sequential datasets (ESDS).

Technical

What are the main system components of zDataConnect?

The core components include the Intercept Module, which intercepts I/O requests; the Communication Manager, which handles network communication; and the Security Manager, which enforces access control policies.

What configuration files are used by zDataConnect?

zDataConnect uses configuration files, typically in PARMLIB datasets, to define dataset mappings, communication parameters, and security policies. These files are read during system initialization.

How does zDataConnect handle security?

zDataConnect uses standard z/OS security mechanisms, such as RACF, ACF2, or Top Secret, for authentication and authorization. It integrates with these security systems to enforce access control policies.

What administrative interfaces are available?

zDataConnect provides a CLI for administrative tasks, such as configuring dataset mappings, managing security policies, and monitoring system activity. The CLI is accessed through a TSO session or a z/OS console.

What monitoring and logging capabilities exist?

zDataConnect logs system activity, including dataset access requests, security events, and error messages, to SMF records and system logs. These logs can be used for auditing and troubleshooting.

Business Value

How does zDataConnect provide business value?

zDataConnect reduces the need for data replication and transfer, minimizing storage costs and network bandwidth usage. It enables real-time access to data, improving decision-making and operational efficiency.

How does zDataConnect simplify application development?

By providing transparent access to remote datasets, zDataConnect eliminates the need for complex data integration processes. This simplifies application development and reduces maintenance costs.

How does zDataConnect improve resource utilization?

zDataConnect enables organizations to consolidate data storage and management, reducing infrastructure complexity and improving resource utilization. This leads to cost savings and increased agility.

Security

What authentication methods are supported by zDataConnect?

zDataConnect supports authentication methods such as LDAP, Kerberos, and multi-factor authentication (MFA) to verify user identities. It integrates with existing security infrastructure for seamless authentication.

What access control model is used by zDataConnect?

zDataConnect uses an access control model based on Role-Based Access Control (RBAC). Administrators assign roles to users, and these roles determine the datasets and operations that users are authorized to access.

What encryption is used by zDataConnect?

zDataConnect uses encryption protocols such as TLS/SSL to protect data in transit between systems. It also supports encryption at rest for sensitive datasets, using z/OS encryption facilities.

What audit and logging capabilities exist in zDataConnect?

zDataConnect provides comprehensive audit logging capabilities, recording all dataset access requests, security events, and administrative actions. These logs can be used for security monitoring and compliance reporting.

Operations

How can zDataConnect be monitored?

zDataConnect can be monitored using standard z/OS monitoring tools, such as SMF and RMF. It also provides a dedicated monitoring interface that displays system status, performance metrics, and error messages.

What restart and recovery capabilities does zDataConnect have?

zDataConnect supports automated restart and recovery procedures to ensure high availability. It can be integrated with z/OS workload management systems to prioritize critical dataset access requests.

How does zDataConnect integrate with z/OS automation tools?

zDataConnect can be integrated with z/OS automation tools, such as IBM System Automation for z/OS, to automate routine administrative tasks and respond to system events. This reduces operational overhead and improves efficiency.

Ready to Start Your Migration?

Download our comprehensive migration guide for zDataConnect or calculate your ROI.

Calculate ROI