Previous Topic: Use APF Authorized LibrariesNext Topic: Protect CA Datacom/DB Critical System and User Data Sets from Non-Datacom Access


Protect CA Datacom/DB Environments from Executing without External Security

To protect against a CA Datacom/DB environment executing without external security controls, install CA Datacom external security facilities that interface directly with CA ACF2, CA Top Secret, and IBMs RACF.

Business Value

Utilizing the external security interface greatly increases your ability to secure and protect your data. While internal product security and application security can be used, there are exposed areas that are not controlled in most cases.

Additional Considerations

The CA Datacom/DB external security interface allows you to secure data resources according to the security ID of the user, the path the user is using (batch, CICS, CA Datacom Server, and CA Dataquery for Datacom), and the language API that is being used (RAAT, SAAT and SQL).

This security model greatly enhances the security administrator’s ability to create a security profile that matches exactly what a user needs.

In addition, the external security interface can be used to control product level functions such as CA Datacom Datadictionary administration, DBUTLTY processing, and many other product functions provided by CA Datacom.