The next five areas of concern are all addressed by the use of preauthorizations. They are:
LIM-AUTH = N
NO-AUTH = N
Set the A-OPT flags in the same SECURITY-CLASS record to N for all entity types that are to be protected. Then establish a PREAUTHORIZATION junction between each "dangerous user" and all of the entities that the user is to be allowed to change.
LIM-AUTH = Y
NO-AUTH = N
Set the A-OPT flags in every SECURITY-CLASS record to N for those entity types that are to be protected. Then establish a PREAUTHORIZATION junction between each sensitive entity and each user that is to be allowed to modify that entity.
Note: The protection requires at least one PREAUTHORIZATION junction for each sensitive entity. If an entity participates in NO PREAUTHORIZATION junctions, it is assumed by the system not to be sensitive.
ENTITY NAME = ccid-name
TYPE = CCID
VERSION = 1
ENTITY NAME = status-name
TYPE = STATUS
VERSION = 1
|
Copyright © 2013 CA.
All rights reserved.
|
|