Your browser does not allow storing cookies. We recommend enabling them.

SSH

File Transfers Using REXX Scripts and a JCL Procedure

Tectia Server for IBM z/OS contains example file transfer procedure and REXX functions for scpg3, sftpg3, and sshg3 client applications.

The following PROC, REXX functions, and examples can be found from SAMPLIB and they can be easily modified according to the customer environment and needs. The REXX functions can also be called from user-written REXX programs.

  • SSZJSAMP: Comprehensive JCL example file containing file transfer and remote command examples

  • SSZJSFTP: Example JCL file for running multiple sftpg3 commands

  • SSZP: JCL Procedure for running REXX functions

Enabling the File Transfer JCL Procedure

By default, the JCL prodecure is set to run from the default SAMPLIB location, //'&SYSUID..SSZ.SRVR63.SAMPLIB'. If the procedure and REXX functions are run from some other location, modify the EXECLIB parameter on the SSZP procedure accordingly.

Example 1: SSZJSFTP

In this example multiple sftpg3 file transfer commands are run using the SSZP procedure:

//SFTP  EXEC SSZP,
//       PARM='SSZRFT'
//*
//SFTCMDS DD *
open username@unix_server.example.com
sget text_file.txt //'USERID.TEST.DATA.SET'
sput //'USERID.TEST.DATA.SET' demo_file.txt 
lrm //TEST.DATA.SET 
sget demo_file.txt //PDS(MEM2) 
rm demo_file.txt 
sput //'USERID.PDS(MEM2)' member2 
ascii
lsite O=FB R=80
sget jcl.txt //'USERID.JCLLIB(JCL1)'


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more