Previous Topic: Security Audits and ReportingNext Topic: Setting Up Resource Classes


Access Validation

Once it has identified the user, the Security Facility determines if the resource is in a database secured under the SQL Security Model or the CA Datacom/DB Security Model. The Security Facility then validates the rights of the user based on the rules or permissions in the external security package or SQL security.