Previous Topic: Limit Access to Hosts with Sensitive InformationNext Topic: Create a Touchpoint Security Policy


Identify the Access Control IDs To Add as Resources

When you create a Touchpoint Security policy, you do not directly identify the operators that act on touchpoints you want to secure. Instead, you identify the categories to which those operators belong. You identify the categories, not by name, but by Access Control ID.

In the Add resource field, enter an Access Control ID, such as Process Module, and click Add.

Not all categories contain operators that could compromise the security of a host with sensitive information. Evaluate the impact of operators before adding resources.

You can identify the Access Control ID to add as a resource to a Touchpoint Security policy.

Follow these steps:

  1. Browse to CA Process Automation and log in.
  2. Click the Configuration tab.
  3. Select an agent from the Agents node and then select the Modules tab.
  4. Note the names as they appear in the Access Control ID column.

    The Access Control ID column lists the module names as they are to be entered on a Touchpoint Security policy.

    Important! The Access Control ID column lists module names. Refer to this list when you enter selected module names in the Resources field in a Touchpoint Security policy.