CA Endevor SCM uses the most restrictive parameters to determine security checks for each user (Access Security Table and User Security Table) and each resource (Resource Security Table).
In the following example, users having IDs that start with the letters CADEV, except for the two exceptions, have access to all systems and subsystems, for all types of processing.
CONSDEF TYPE=USER,USERID=CADEV1,SYSDEF=((FINANCE,$,N)) CONSDEF TYPE=USER,USERID=CADEV8,SYSDEF=(($,$,N)) CONSDEF TYPE=USER,USERID=CADEV$,SYSDEF=(($,$,ADMPRSUZ,BV))
The two exceptions, CADEV1 and CADEV8, are restricted in the following ways:
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|