The Security Command Manager module supports all CA ACF2, CA Top Secret, and IBM RACF commands. This module works with the CA DSI Server to process the commands and display the results. You can connect to multiple security systems based on the configuration set by your systems programmer.
Note: For more information about security system access from this module, see the CA Chorus for Security and Compliance Management Site Preparation Guide.
Follow these steps:
The Security Command Manager module opens. The previously selected system appears in the System field. Your CA Chorus logged-in user name appears in the User Name field.
Note: If there is not a previously-selected system, the first system in the System drop-down list is selected.
Note: After you select a system, CA Chorus generates a PassTicket to authorize your connection. If the PassTicket authorization fails, enter your password to log in to the system.
Note: For more information about the application ID and identifying systems for the Security Command Manager module, see the CA Chorus for Security and Compliance Management Site Preparation Guide.
Note: The Security Command Manager validates the selected file. The file must be a .txt file (UTF-8 or ASCII) or .sql file, less than 100 KB. Binary files are not supported.
The Command Results area shows the output. The module appends the output for each additional command at the bottom of the results of the previous command.
Note: You can export security commands output to a text file. Click the Export icon on the toolbar, enter a file name, and click save. If you are using Mozilla Firefox, the file is saved as "chorusdata.txt".
Note: If you are unable to access a security system, contact your systems programmer. For command syntax details, see the CA ACF2 Administration Guide, CA Top Secret Command Functions Guide, CA Top Secret Control Options Guide, or IBM documentation.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|