

Special Features and Customization Tasks › How to Customize Security › Customize Security When Security System Is CA Top Secret
Customize Security When Security System Is CA Top Secret
To customize your system when the Security System is CA Top Secret
- Specify TOPS in the Security System field of the System Options Table (SMRT).
- Put your application modules in an APF-authorized library, as described in the Installation Guide.
- Specify the following statements in the CA Top Secret ACID table:
FAC(USER1=NAME=TPX)
FAC(PGM=TPX)
FAC(TPX=(ACTIVE,SHRPRF,MULTIUSER,AUTHINIT))
- If your site uses APPL class rules, you can specify in the software an alias for the VTAM PLU name. This allows you to:
- Use a different name if you cannot use the existing PLU name.
- Refer to a number of copies of the product with one alias, so only one APPL class rule applies to all copies using the alias.
Specify the alias in the Alias Name field of the SMRT.
Notes for CA Top Secret Users:
- CA Top Secret must be completely operational before CA TPX is started.
- CA Top Secret can issue the TPX START command.
- You can use the Security Action/Message Table (SAMT) to customize the response of this product to messages produced by CA Top Secret. For information about using this table, see the Administration Guide.
Copyright © 2013 CA.
All rights reserved.
 
|
|