Previous Topic: Functional SecurityNext Topic: Native Security


Security Control Points

During processing, CA Endevor SCM performs security checks to allow or deny a user access to certain inventory areas and inventory actions. These checkpoints are referred to as security control points.

The security control points listed determine the appropriate level of access to system inventories and functions:

Environment Selection

Verifies your access to a requested environment.

Primary Options

Verifies your access to particular operations appearing in the Primary Options menu.

Foreground Options

Verifies your access to actions available on the Foreground Options menu.

Action Initiation

Verifies your access to actions such as DISPLAY, ADD/UPDATE, RETRIEVE, or GENERATE.

Package Actions

Verifies a user's access to package actions such as CREATE, CAST, DYNAMIC, REVIEW, and EXECUTE (applies to ESI only).

Concurrent Action Processing

Verifies a user's access to request concurrent action processing.

When security control points are reached, CA Endevor SCM checks access privileges defined in one of the following security configurations:

For example, when CA Endevor SCM reaches a security control point, the system reviews the native security tables and determines whether a user is allowed to perform certain inventory actions against a portion of the inventory. CA Endevor SCM then hides inventory elements the user is not permitted to access and functions the user is not allowed to perform. In this way, ESI allows you to customize your functional security capabilities.