Previous Topic: Planning the Security SchemeNext Topic: Activating Security


Creating Security Definitions

External Security Definitions

If security enforcement for a CA IDMS resource is external, you do not need to store information about the resource in the CA IDMS security database.

Before you create the SRTT entries that contain external security information, be sure to complete the steps necessary to define resources and security rules for resources in the external security system. When you create the SRTT with entries that include SECBY=EXTERNAL, you activate external security enforcement for the resource types specified in those entries.

Note: For more information, see Using External Security.

For external security checking, you must specify in the #SECRTT entry the format of the resource name that centralized security should forward to the external security system. You construct the external resource name format in the SRTT to match the format you have specified for the resource in the external security system.

Note: For more information, see Constructing an External Resource Name.

Internal Security Definitions

To secure one or more resources internally, you must define users to the user catalog and grant privileges on the resources to users. You can create any or all of these definitions before activating security in the SRTT. Remember, however, that until you activate security for CA IDMS administration privileges, any users signed on to the system can also manipulate internal security definitions (and any user can sign on until signon is secured).

As you plan the sequence of creating the security definitions needed for your security scheme, be aware of these considerations: