This section contains the following topics:
Restricting Users Through Preauthorization
Protecting Critical Entities Through Preauthorization
Restricting Access to a CCID Through Preauthorization
Assigning Status Privileges Through Preauthorization
Preparing for Derived CCID Processing
|
Copyright © 2013 CA.
All rights reserved.
|
|