DATABridge Security

When you run a DATABridge Accessory, normal host security restrictions apply. For example, the DATABridge Accessory must run under a usercode that has access to the appropriate DMSII DESCRIPTION files and the audit files. All of the typical file access rules of the host apply to the DATABridge Accessories. In other words, security is dependent on the usercode under which DATABridge is run.

You can run DATABridge under a usercode different from the usercode under which you install it. DATABridge also supports guardfile validation. For more information, see the DATABridge Installation Guide.

Custom Filtering

DATABridge provides a method for restricting access to certain data sets (or remaps) and certain records within the data sets (or remaps). You can put these visibility restrictions in a tailored support library via the GenFormat program. Before DATABridge returns a record to the secondary database system, it applies the visibility constraints in the tailored support library.

To create a filter, see Creating a Filter.

Logical Databases

If you don’t want to create a tailored support library, you can restrict access to data sets and records by creating a logical database and then running the accessory against the logical database. DBEngine restricts access to data sets and remaps in the logical database. You can specify the logical database when you start the accessories via the WFLs.