During processing, CA Endevor SCM performs security checks to allow or deny a user access to certain inventory areas and inventory actions. These checkpoints are referred to as security control points.
The security control points listed determine the appropriate level of access to system inventories and functions:
Verifies your access to a requested environment.
Verifies your access to particular operations appearing in the Primary Options menu.
Verifies your access to actions available on the Foreground Options menu.
Verifies your access to actions such as DISPLAY, ADD/UPDATE, RETRIEVE, or GENERATE.
Verifies a user's access to package actions such as CREATE, CAST, DYNAMIC, REVIEW, and EXECUTE (applies to ESI only).
Verifies a user's access to request concurrent action processing.
When security control points are reached, CA Endevor SCM checks access privileges defined in one of the following security configurations:
For example, when CA Endevor SCM reaches a security control point, the system reviews the native security tables and determines whether a user is allowed to perform certain inventory actions against a portion of the inventory. CA Endevor SCM then hides inventory elements the user is not permitted to access and functions the user is not allowed to perform. In this way, ESI allows you to customize your functional security capabilities.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|