The following steps prompt the security product to begin recording changes made to security product information that is replicated in the CIA repository.
Important! Perform the following steps on every z/OS image whose security information is represented in the CA Chorus CIA repository. If a security product database is shared across multiple z/OS images, perform these tasks on each of the z/OS images. Administrative commands, SAF calls, and user sign-on and signoff processes on any of the z/OS images can change information in the security database that is replicated in the CIA repository. The CIA real-time process must communicate all of these changes to the CIA repository.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|