Use the Security Command Manager to resolve any dependencies that you identified before deleting a user ID. Resolve dependencies to help ensure continuity of security after you delete the user.
Follow these steps:
The Security Command Manager module opens. The previously selected system appears in the System field. Your CA Chorus user name appears in the User Name field.
Note: If there is no previously selected system, the first system in the System drop-down list is selected.
Note: For command syntax details, see the CA ACF2 Administration Guide, CA Top Secret Command Functions Guide, or CA Top Secret Control Options Guide. For information about managing digital certificates, see the CA Top Secret Cookbook or CA ACF2 Cookbook.
The Command Results area shows the output. The module appends the output for each additional command to the results of the previous command.
You have resolved dependencies and can now delete the user.
Example: Resolve Dependencies
This example transfers dataset sys.01 from existing CA Top Secret ACID to ACID testdep1.
TSS ADDTO(testdep1) DSN(sys.01) UNDERCUT
This example moves ACID divtest1 to zone zonetst1.
TSS MOVE(divtest1) ZONE(zonetst1)
This example moves ACID testdep1 to division divtest2.
TSS MOVE(testdep1) DIV(divtest2)
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|