Previous Topic: Run the Batch Reporting JobNext Topic: View Security Object Relationships in the Topology Viewer


Issue a Security Command

The Security Command Manager module supports all CA ACF2, CA Top Secret, and IBM RACF commands. This module works with the CA DSI Server to process the commands and display the results. You can connect to multiple security systems based on the configuration set by your systems programmer.

Note: For more information about security system access from this module, see the CA Chorus for Security and Compliance Management Site Preparation Guide.

Follow these steps:

  1. Add the Security Command Manager module to your dashboard from the Module Library.

    The Security Command Manager module opens. The previously selected system appears in the System field. Your CA Chorus logged-in user name appears in the User Name field.

    Note: If there is not a previously-selected system, the first system in the System drop-down list is selected.

  2. Select a system from the System drop-down list to connect to a different system.
  3. Choose one of the following options:

    Note: After you select a system, CA Chorus generates a PassTicket to authorize your connection. If the PassTicket authorization fails, enter your password to log in to the system.

  4. Enter your user name.
  5. (Optional) Enter the password for the selected system. The Password field appears in the following cases:

    Note: For more information about the application ID and identifying systems for the Security Command Manager module, see the CA Chorus for Security and Compliance Management Site Preparation Guide.

  6. Do one of the following:
  7. Click Submit.

    The Command Results area shows the output. The module appends the output for each additional command at the bottom of the results of the previous command.

    Note: You can export security commands output to a text file. Click the Export icon on the toolbar, enter a file name, and click save. If you are using Mozilla Firefox, the file is saved as "chorusdata.txt".

  8. Click Clear Input or Clear Output to clear command data area.

Note: If you are unable to access a security system, contact your systems programmer. For command syntax details, see the CA ACF2 Administration Guide, CA Top Secret Command Functions Guide, CA Top Secret Control Options Guide, or IBM documentation.