Previous Topic: Using External Security for CA DatacomNext Topic: Prerequisites


Considerations

To externalize CA Datacom security, decisions about user access to product functions and data must be made and relayed to the Security Administrator. In turn, the Security Administrator conveys the information to the external security product by constructing resources to represent each access right or level. Each resource directly controls access to a specific function in a CA Datacom product.

Externally securing all CA Datacom products can be a major undertaking. It is important that the product administrators, who can provide product-specific information, participate in the task of securing their products.

Once CA Datacom resources are stored in the external security product and the appropriate initiation steps taken, the external security product has control. CA Datacom products defer to external security with the exception of SQL security.

The following are discussed in this overview of using external security for CA Datacom/DB: