

Establishing Signon Processing › Signon Processing Execution Flow
Signon Processing Execution Flow
The signon process controls the first level of security. During signon, either CA Ideal or an external security system checks to make sure that the user is authorized to access CA Ideal. In general, the CA Ideal signon process works as follows:
- You sign on to the teleprocessing monitor system. If a security system is used, the teleprocessing monitor system passes control to the security system, which determines whether you are allowed to sign on. It then returns your security ID to the teleprocessing monitor system.
- You sign on to CA Ideal. The signon command or transaction you enter invokes an initialization procedure, which:
- Loads the SC00TRAN table and checks for the signon transaction.
- Loads the SC00OPTS table to determine how to get the identity of the operator.
- Optionally, checks to make sure you are not already signed on to CA Ideal somewhere else.
- Loads the IDOPTS table.
- Checks your external security resource class to make sure you can access the product.
- Checks for the user ID in the dictionary (User Definition).
- Executes the signon exit (if necessary).
You can use a default user definition when the user's signon-id is not found in the dictionary.
When you use an external security package to control access to CA Ideal, the security ID identifies the user instead of an operator ID or a terminal ID. There are differences in the parameter values in the SC00TRAN and IDOPTS tables, the site options have different settings, and the security ID finds the user definition in the dictionary.
Copyright © 2015 CA Technologies.
All rights reserved.
 
|
|