Previous Topic: Using Coding ConventionsNext Topic: How to Define the Access Security Table


Order of Security Definitions

CA Endevor SCM uses the most restrictive parameters to determine security checks for each user (Access Security Table and User Security Table) and each resource (Resource Security Table).

In the following example, users having IDs that start with the letters CADEV, except for the two exceptions, have access to all systems and subsystems, for all types of processing.

 CONSDEF TYPE=USER,USERID=CADEV1,SYSDEF=((FINANCE,$,N))
 CONSDEF TYPE=USER,USERID=CADEV8,SYSDEF=(($,$,N))
 CONSDEF TYPE=USER,USERID=CADEV$,SYSDEF=(($,$,ADMPRSUZ,BV))

The two exceptions, CADEV1 and CADEV8, are restricted in the following ways: