Previous Topic: Security Control PointsNext Topic: The External Security Interface (ESI)


Native Security

Native security uses the following three security tables to record security rules for access to inventory levels and functions:

Access Security Table (one for an installation)

Defines the environments to which you have access.

User Security Table (one for an environment)

Defines the menu options available to you after access to an environment is obtained. Further, this table defines actions allowed within the environment, by user, for each system and subsystem.

Resource Security Table (one for an environment)

Enforces naming conventions at the system/subsystem and element level.

The following figure shows how control points can control access to CA Endevor SCM processing functions by checking native security tables.

This figure shows how control points can control access to processing functions.

As previously illustrated, upon entry into the system, your access to CA Endevor SCM functions is controlled by CA Endevor SCM Security Tables or the CA Endevor SCM (ESI). Site security provides protection of system data sets.