Previous Topic: Control Table Access Using SQL Resources or OPSGLOBAL

Next Topic: How to Implement External Security with CA Top Secret

Implementing External Security with CA Top Secret

This section contains the following topics:

How to Implement External Security with CA Top Secret

Customize Resource Class with CA Top Secret

Define Profiles Based on Function for Validation

Define Profiles Automatically with DEFSAF

Generate the SAF Resources with CA Top Secret

Batch Execute External Security Manager Commands to Create the Owner and Profiles

Create Access Permissions with CA Top Secret

Add User Access to Product Resources

Authorize User IDs to Use a Specific Command