Access types and roles are the primary components you use to control CA SDM security.
The following diagram shows an overview of how roles interrelate with other system objects to provide role-based security.
Note: For more information about other aspects security, see Security.
Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |