To protect against a CA Datacom/DB environment executing without external security controls, install CA Datacom external security facilities that interface directly with CA ACF2, CA Top Secret, and IBMs RACF.
Business Value
Utilizing the external security interface greatly increases your ability to secure and protect your data. While internal product security and application security can be used, there are exposed areas that are not controlled in most cases.
Additional Considerations
The CA Datacom/DB external security interface allows you to secure data resources according to the security ID of the user, the path the user is using (batch, CICS, CA Datacom Server, and CA Dataquery for Datacom), and the language API that is being used (RAAT, SAAT and SQL).
This security model greatly enhances the security administrator’s ability to create a security profile that matches exactly what a user needs.
In addition, the external security interface can be used to control product level functions such as CA Datacom Datadictionary administration, DBUTLTY processing, and many other product functions provided by CA Datacom.
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|