Previous Topic: Logical Database DefinitionNext Topic: Getting Started


Security

Access to CA IDMS databases and the DC/UCF runtime environment is controlled through a common security facility. This security facility allows access to be controlled using CA IDMS internal security services or external security packages, such as CA ACF2, CA Top Secret, or RACF.

Note: For more information, see the CA IDMS Security Administration Guide.