Security Checking
The CA IDMS centralized security facility handles all security checks issued during CA IDMS processing. Security requests are routed to the central security interface to provide uniform validation of requests.
Security Enforcement
The security option that is specified in the SRTT for the resource type or resource type occurrence determines how security is enforced.
Example: You can control the execution of tasks with the external security system, but control access to a particular database with CA IDMS internal security.
If the security option for the resource being checked is external, the request is routed to the external security system. The external security system returns a value to the centralized security interface representing the result of the check.
If the security option for the resource being checked is internal, CA IDMS centralized security verifies that the user holds the required permission.
Centralized Security Diagram
This illustration shows the flow of processing in the CA IDMS centralized security system:
┌──────────────────┐ ┌──────────────────┐ ┌──────────────────┐ │ │ │ │ │ │ │ Security │ │ Command │ │ CA IDMS │ │ syntax ├─────────► facility ├──────────► security │ │ │ │ │ │ definition │ │ │ │ │ │ │ └──────────────────┘ └────────┬─────────┘ └────────┬─────────┘ │ │ │ │ │ ┌────────▼─────────┐ │ │ │ │ │ CA IDMS │ ┌────────▼─────────┐ │ internal │ ┌──────────────────┐ │ ├──────────► security │ │ │ │ │ │ │ │ CA IDMS │ │ Central │ └──────────────────┘ │ component ├─────────► security │ │ │ │ interface │ │ (IDD, DB, DC ...)│ │ │ ┌──────────────────┐ │ │ │ │ │ │ └──────────────────┘ │ ├──────────► External │ └──────────────────┘ │ security │ │ interface │ │ │ └──────────────────┘
|
Copyright © 2014 CA.
All rights reserved.
|
|