

Enabling Native Security › How to Implement Native Security
How to Implement Native Security
To implement native security
- Define the Access, User, and Resource Security Tables to control access to the environments, systems/subsystems, and elements you want to protect from unauthorized access.
- Assemble and link-edit each security table you have defined.
- Update the Defaults Table to reference the security tables you have defined.
- Once you have sufficiently tested your functional security, copy the security table you defined as well as the new Defaults table, into an authorized library and perform an IPL or LLA refresh.
Note: If you are testing your security system, you do not need to issue an LLA refresh each time you edit a native security table if the tables are not in an authorized linklist library. Once you are ready for production mode, you need to copy your security tables into an authorized linklist library for security, and issue an LLA refresh.
The following sections explain each step in greater detail.
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|