|
COMMERCE BUSINESS DAILY ISSUE OF MARCH 4,1998 PSA#2044Department of the Treasury, Bureau of the Public Debt, Division of
Procurement, 200 Third Street, Room 207, Parkersburg, WV 26101-5312 70 -- MAINFRAME SOFTWARE MAINTENANCE SOL BPD-98-CI-0010 DUE 031898 POC
Point of Contact, Jeff Stephenson, 304/480-6452, Contracting Officer,
Tammie S Johnson, 304/480-6465 WEB: Department of the Treasury, Bureau
of the Public Debt, Division of Procurement,
http://www.publicdebt.treas.gov/oa/oaprocr.htm. E-MAIL: Department of
the Treasury, Bureau of the Public Debt, Division of Procurement,
procurement@bpd.treas.gov. Public Debt intends to negotiate a sole
source procurement with Computer Associates International, Inc., 12120
Sunset Hills Road, Reston, Virginia, 22090, for software maintenance
for the following products which meet the functional requirements
listed: a) Shall provide access through panels under Interactive
Systems Productivity Family (ISPF); b) Shall allow restriction of
abilities via CA-ACF2, or compatible security subsystem; c) Shall be
menu-driven and provide online tutorial and help functions; d) Provide
for an unlimited number of users. The CA-VMAN Utility shall: a)
Utilize ACF2 or other industry recognized security package to control
logons to all sessions; b) Have a time-out feature for Multi-Session
Manager (MSM) sessions without an active application session; c) Use
ISPF-like panels for logons and switching from session to session via
"PF Keys" or "Hot Keys", the logon panel shall contain the status and
availability of all sessions; d) Have message broadcast capabilities
which will cause visual/audible alarms when a message is issued by the
MSM administrator, master console, or other terminal authorized to
send messages; e) Have the capability to restrict access to the system
via MSM, user shall not be allowed to circumvent the established
security features by using the MSM; f) Shall not interfere with
application session portability; g) Shall not preempt or circumvent an
application's control over a user once that user has logged on or
attached to it; h) Utilize the expanded capabilities of MVS/ESA
including "above the 6Mb" line storage; i) Provide recording facilities
for MSM activities in accordance with C2 requirements, i.e., logons,
logon failures, and security violations; j) Provide cross-domain
security for user logons coming from a remote site, every logon to the
Public Debt mainframe computer shall come through the MSM; k) Provide
the capability for users to log on to applications without the need to
re-enter logon identifications or passwords; l) Provide for definition
of users, terminals, and other resource definitions without the need
to shut down the software and perform a restart; m) Provide for an
unlimited number of session administrators; n) Provide an operator
facility within the software to allow authorized users the capability
to control all sessions and perform inquiries of the status of all
applications for all users; o) Provide for application selection menus
depicting only the applications authorized for each user; p) Provide
the capability to reconnect to the session manager in the event of a
communication line disconnect, a time-out feature shall be included to
allow users a reasonable time period to re-establish the session, when
this time-out threshold is met, the product shall terminate all active
applications as well as terminate the session manager session. The
ENDEVOR/MVS Utility shall: a) Provide for a central library for
programs, job control streams, and data files; b) Provide for
protection of production programs and change or deletion by:
Restricting modification of stored members, Copying production members
to create test versions, Replacing original production version after
testing, Eliminating accidental or unauthorized alteration of
production programs, job control streams, or data files, and Reserving
the delete option for management use only; c) Restrict retrieval of,
and access to, confidential data files and source programs; d) Provide
complete backup of all programs, job control streams, and data files;
e) Provide a history of all prior versions of programs, job control
streams, and data files with the capability to: Copy deleted members to
a protection file before physically removing them from the library,
Match-merges or merge deleted members with a previously created
protection file, Reinstate a prior version of a source program or
object code to the library; f) Provide for the transfer of programs,
job control streams, and data files between libraries and provide
ability to replace any prior version of the same member which has been
stored with the incoming member; g) Provide a method for storing,
modifying, and retrieving programs, job control streams, and stored
data files and permit the following functions: Adding of a source
program to the library and the ability to modify, retrieve, compile,
link edit, and execute it in a single job, Jobstream second generation
programs in the library onto tape or disk with appropriate JCL,
Retrieve any segment of any program and combine it with other program
segments or programs to form a new program, Store and retrieve test
data, Retrieve, modify, and combine any number of programs and JCL to
form a job stream on either tape or disk for compiling and link
editing; h) Provide a means to report the success or failure of all
functions performed on an output print file and produce the following
reports: A library directory listing, A directory listing of members by
selected characteristics, status, or activity, A protection file
directory listing; i) Provide the following features and functions: Add
members to the library, format member records, assign member attributes
and sequence check members, Copy members on the library and retrieve
members from the library, Insert data from the SYSIN file into output
files, Retrieve portions of members, modify members and tag members for
subsequent deletion, Include members within other members during
retrievals, Assign user comments to members on the library, Allocate
supersets on the library file and add subsets to supersets, Assign user
sequence numbers to a member, Initiate a transient mode extended
feature, Advance the output print file to the next page and print user
identification on a separate page, Specify auxiliary input from or
output to a PDS, Insert records from an existing member into an input
stream; j) Provide a means for management to: Secure confidential
members on the library, override any suppressed functions, and
authorize access to confidential members, Create a directory list of
the entire or selected contents of the library or protection file,
Produce a completeand current compressed copy of the entire library
file which can be produced on tape or disk and gives complete backup
protection to the resident library, Replace all or selected members in
a library from tape or disk backup files, Restore all or selected
members to the library from any of the backup files, Remove tagged
members to a protection file, with or without matching-merging an input
protection file, Create a protection file for members which are to be
transferred to another library file, with or without matching-merging
an input protection file, Initiate transient mode extended features,
Modify the library security code, Transfer a member directly to another
library, Bypass copying a named member or a range of members from an
input protection file; k) Provide a library initialization program to
format and label direct access devices for subsequent use as a library;
l) Provide an analysis program which will produce a summarized
presentation of the library's composition by size, status, type, and
usercode; m) Provide a scan function which will produce a listing of
statements within the library which contain a supplied character
string. The scan shall be of the entire library or limited to a given
language type, library member, a selected range of commands, or a
selected group of columns. The ability to make changes to the members
selected by the scan shall be provided; n) Provide a comparison
function for reporting the changes made to source code and of the
differences between files. The ENDEVOR QUICK EDIT Utility shall: a)
operate in conjunction with ENDEVOR/MVS version 3.7; b) Be a program
management and security system designed to establish, maintain, and
protect a central library of source programs and JCL. The central
library shall be immediately accessible for maintenance and processing
and effective control and protection against theft, disaster, or other
loss; c) Function as a subsystem of ISPF and be incorporated as a new
option on the ISPF menu to allow the user to select EDIT, BROWSE, or
UTILITY mode; d) Be retrievable directly into memory for editing. The
actual editing shall be identical to ISPF and permit the user to
create, display, and modify programs stored in the central library of
source code; e) BROWSE operations should allow the user read only
access to the member; f) Provide a menu of utility functions which
allows the user to modify the program status, user code, or the level
number. The utility shall support copy and rename commands, and provide
the ability to print a member to the ISPF list data set. The PARALLEL
DEVELOPMENT MANAGER UTILITY shall: a) operate in conjunction with
ENDEVOR/MVS version 3.7 as well as any partition data set or PANVALET
library structures; b) allow restrictions of abilities via CA-ACF2; c)
provide compares against multiple versions of source codes that are
controlled by ENDEVOR/MVS; d) provide for the automatic integration of
multiple versions of source code that are controlled by ENDEVOR/MVS;
e) provide for the ability to resolve conflicts resulting from
concurrent development or from applying vendor updates to applications
that have been customized in-house; f) provide automatic creation of
final source from edited, integrated changes; g) provide for the
ability to generate standard and customized reports on parallel
development activities; h) provide impact analysis reporting at any
phase in the development cycle. The CA-1 TMS Utility shall: a) Provide
operations interface and the ability to code retentions which will be
used as final authority for data retention, and/or expiration
information; b) Manage mountable media including 480 compatible, 40
compatible, and other magnetic tape media; and shall include recording,
dynamically updating, and reporting information related to volume
serial number, file and data contents, when created, where created,
when and where last used, etc.; c) Provide allocation/open time
interfaces to the operating system sufficient to ensure data integrity,
avoid accidental data loss, and provide real time recording of usage
information; d) Track and report volume status information so that
scratch volumes can be readily identified and used by operations
personnel; e) Log, update, track, and manage location information in an
automated fashion; f) Provide online updating and query capabilities;
g) Provide flexible reporting of contents which can be selected from
various fields and sort sequences within the database; h) Support and
be compatible with the Memorex Automated Tape Library; i) Support mixed
480 standard, 480 IDRC, 490 E 6 track, and 490 6 track extended length.
The ASTEX DASD MANAGER Tool shall: a) Support IBM or equivalent 80 and
90 DASD devices and associated cache control units (including Amdahl
690 DASD and 600 controllers); b) Collect and record DASD seek activity
and DASD controller cache activity; c) Produce analytical reports from
either its own recorded DASD activity data or from GTF (Generalized
Trace Facility) data; d) Include an interactive TSO/ISPF interface for
creation and submission of DASD analysis jobstreams; e) Provide the
capability to report DASD seek activity by volume, dataset, allocated
extent, and/or jobname; f) Analyze DASD seek activity and recommend the
relocation of datasets either on a volume or within a group of volumes,
for improved performance; g) Provide the capability to simulate the
impact of proposed DASD configuration changes on seek and cache
activity; h) Create JCL and control statements which can be used to
perform recommended dataset movement, using either FDR/DSF, Compaktor,
DFDSS, or standard IBM utilities. The CA-ACF2 UTILITY shall: a) Meet
the C level of controlled access protection; b) Provide system and
resource protection by default; c) Provide for access protection at
both the data set and volume levels; d) Utilize SMF to log data set and
resource violations; e) Provide a means to automatically backup and
recover security databases; f) Provide report utilities for extracting
SMF data logged by the product; g) Provide the record layouts for
security databases and SMF records for the purpose of creating
customized reports; h) Provide a means for assuring individual user
accountability; i) Contain time-out feature(s) to automatically
terminate a mainframe session if it remains inactive beyond a time
limit specified by Public Debt; j) Provide for system and resource
access based on specific dates, times, and device types; k) Provide for
the option to allow users to change their own passwords; l) Provide the
ability to control minimum and maximum time periods for changing
passwords; m) Allow for a minimum and maximum length for passwords as
specified by Public Debt; n) Utilize passwords that are one-way
encrypted and stored in the security data bases in such a manner as to
prevent decryption; o) Provide ISPF panels for administrative
functions; p) Utilize the expanded capabilities of MVS/ESA including
"above the Megabyte" line storage; q) Provide security interfaces for
IMS, CICS, and DB; r) Provide the capability to administer security for
multiple domains/nodes from a single domain; s) Provide the ability to
control system access from any source; t) Have the capability of
providing resource protection utilizing the System Authorization
Facility (SAF); u) Contain a mechanism that assures system access will
be prevented if the security software becomes inoperative; v) Provide
a mechanism to secure CA-PANVALET libraries; w) Contain a means to
provide access security for data sets residing on magnetic tape; x) Be
capable of providing terminal security by individual terminal ID or by
groups of terminals; y) Provide for centralized and decentralized
security administration; z) Provide security administrators the ability
to allow selective viewing and/or changing of the information contained
in the records residing in the security data bases; aa) Allow changes
to security access controls to become effective without the need to IPL
the system or restart the security product; ab) Provide a method to
identify users and resources individually and in groups; ac) Provide
the option to control access by VTAM APPLID; ad) Have the capability to
limit the number of security violations per session, per user; ae)
Provide for automatic suspension of logon identifications if a
site-determined threshold for invalid password attempts is met; af)
Provide the capability to log to SMF access to selected data and
resources based on individual users and groups of users; ag) Have the
capability to control access for started tasks; ah) Provide for logon
id inheritance in batch jobs submitted via TSO; ai) Have the capability
to limit the use of TSO commands; aj) Provide an option for automatic
erasure of reusable data space on any storage media when a file is
deleted; ak) Contain the ability to globally limit the use of specific
programs such as AMASPZAP and IMASPZAP no matter where they reside;
al) Provide an automated means of notifying users of impending password
expiration dates/times for a number of days prior to expiration; am)
Provide an option for the security administrator to establish the
number of days of password "life". The MULTI-IMAGE MANAGER UTILITY
shall: a) Operate on AMDAHL 5990 series mainframes using the MVS/ESA
operating system and logically partitioned under MDF; b) Allow
restriction of abilities via CA-ACF2; c) Menu-driven and provide online
help functions; d) Allow enterprise control and consolidation from a
central workstation(s); e) Automatically prevent most common forms of
data set damage; i.e., simultaneous updates, inappropriate updates,
attribute modification, and overwriting partitioned data set
directories; f) Prevent unauthorized programs from reading data sets
and monitor unauthorized read operations; g) Simultaneously transmit
ENQ requests from an application on one system to all other systems; h)
Automatically notify end-users of resource conflicts as they occur; i)
Automatically free data sets that have been allocated but are not
being used by TSO sessions. If a TSO user is not currently using a data
set that another task requests, the data set shall be automatically
de-allocated to allow processing for the other task to continue; j)
Automatically queue batch jobs contending for data sets and free the
job for execution when the data sets become available; k) Allow tape
drives to be shared automatically between systems; l) Allow devices to
be reserved for specific jobs; m) Allow DASD to be shared by multiple
domains at the dataset level; n) Provide cross-system message
selection and merging; o) Provide a method for cross-system commands;
p) Compatible with IBM's Sysplex strategy; q) Guarantee data integrity.
The CA-EXAMINE utility shall: a) Not allow changes to be made to system
components (i.e., shall have read only functionality); b) Run as a
stand-alone product requiring no changes to existing system
software/hardware; c) Provide real-time status of critical mainframe
computer system software and hardware components utilizing ISPF menus;
d) Provide a method to determine if changes have been made to source
code, object code, and load modules residing on Public Debt mainframes
at intervals determined by Public Debt; e) Provide a method to inform
security administrators (upon demand) when program modules are changed
via programs AMASPZAP and IMASPZAP; f) Provide online reports which
highlight changes to sensitive operating system components which could
potentially downgrade system integrity; g) Inform the product users of
changes to the system Program Properties Table (PPT) upon request; h)
Have the capability of providing lists of programs that are capable of
running in supervisory state; i) Have the capability of creating job
usage history reports from SMF data sets; j) Have the capability to
provide a list of current system catalogs; k) Have the capability to
provide device addresses, associated device types, and classes for all
peripherals connected to the mainframe. Additionally, for DASD
devices, the volume serial numbers and mount status shall be provided;
l) Not interfere with access permissions allowed/disallowed by
existing security access control software; m) Provide a method to
create reports in batch mode containing the same information provided
for online reports; n) Provide online and batch reports identifying
libraries and their components defined as APF (Authorized Program
Facility) authorized; o) Have the capability to identify and provide
reports on all system linklist and LPA (link pack area) libraries; p)
Maintain a record of the logon id of the administrator performing
functions associated with requests for tracking changes to programs,
libraries, and files; q) Have the capability of identifying SMP/E CSI
files and provide reports of FMIDs (Function Modification Identifier),
vendors, program and component numbers, and zone information contained
therein; r) Able to identify and provide reports of critical system
parameters contained in the system parmlib; s) Able to identify MVS
subsystems; t) Able to identify system exits which should be reviewed
due to potential security implications; u) Have the capability to
identify load modules with no apparent corresponding source code; v)
Havethe capability of comparing individual programs or entire load
libraries to determine differences; w) Provide a method to track
changes to specific programs identified as critical by Public Debt; x)
Able to compare files and report the differences; y) Able to perform
volume table of contents (VTOC) analysis to verify its integrity; z)
Able to provide program statistics including size, language, link edit
dates, zaps, and system status index (SSI) indicators; also provide
size, compile dates, language used, zaps, an (0061) Loren Data Corp. http://www.ld.com (SYN# 0267 19980304\70-0007.SOL)
70 - General Purpose ADP Equipment Software, Supplies and Support Eq. Index Page
|
|