

Manage Users › How to Remove a User › (Optional) Review Dependency Considerations › (Optional) Review Dependency Considerations (CA Top Secret)
(Optional) Review Dependency Considerations (CA Top Secret)
To help ensure continuity of security, consider the following points before deleting the user:
- Physical system resources such as data sets, z/OS UNIX files, directories, or others can belong to the user. Review your site policies to determine if you must also delete these resources.
- Transaction processing platforms can use digital certificates and keyrings to support the encryption of IP data flows and user authentication. When you delete an ACID, CA Top Secret also deletes keyrings or digital certificates that the ACID owns. If the DIGICERT and KEYRING definitions are improperly deleted, significant workload disruptions can occur.
- When you delete an ACID, CA Top Secret also deletes keyrings or digital certificates that the ACID owns. Production batch jobs, started tasks for purposes of enabling secure communications, or certificate-based user authentication can use these resources. Deletion can cause significant workload disruptions.
- You must also resolve dependencies if the ACID:
- Owns resources
- Is permitted to other ACIDs
- Is a divisional, departmental, or profile ACID that has other ACIDs linked to it
Copyright © 2013 CA Technologies.
All rights reserved.
 
|
|