Previous Topic: Key Data Set Analysis with CA ACF2

Next Topic: Key Data Set Analysis with RACF

Key Data Set Analysis with CA Top Secret

To analyse a data set, enter A on the line next to the entry.

CA Auditor invokes the CA Top Secret WHOHAS command which returns:

Important! The output may not reflect all possible allowed access situations. For example, ACID-based privileges such as NODSNCHK are not in the output. A security audit should separately audit high privileged users and other situations such as the use of Multi-Level Security (MLS) granting access, a ACID's SUSPEND status, and the use of SAF and CA Top Secret user exits.

For information on the CA Top Secret WHOHAS command, see the CA Top Secret Command Functions Guide.