Previous Topic: Using z/OS Security Administration

Next Topic: How Exploration and Correlation Works

Understanding the Explore and Correlate Function

The explore and correlate function gathers ACID, profile, and group information from the CA Top Secret security file. This information is added into CA Identity Manager at the appropriate level in the endpoint tree. Because the information that is gathered is live data from CA Top Secret, performing the explore and correlate function on a stable, non-changing CA Top Secret data store is recommended. To ensure the information recorded into the Provisioning repository is current and up-to-date, start this process in the evening when there is no activity occurring in the CA Top Secret data store.

With the potential for many thousands of records, the explore and correlate function could run for many hours. As a result, the function for adding CA Top Secret objects runs as a separate task in CA Identity Manager. This enables you to continue working in CA Identity Manager while the exploration and correlation of the CA Top Secret security information continues.

The following are three different options for the Explore and Correlate function of a CA Top Secret endpoint:

The result section and message log reports information consistent with each choice. The difference is most evident with the initial explore and correlate of a CA Top Secret Endpoint.