Using multiple UNIX or Linux groups to control access to applications can provide additional security when required. This section includes examples of other ways to control application access.
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|