Previous Topic: Customize Security When Security System Is User Exit SecurityNext Topic: Enhanced Security Process


Use CA TPX Security to Access CA STX

If you also have the CA STX component, you can set up your security so CA STX security validation is not performed for users who have been validated when signing on to this product. It is called enhanced CA TPX security.

To operate with the enhanced CA TPX security

  1. Specify enhanced security for CA STX in the CA TPX ACT.
  2. Ensure that the session data transmitted from CA TPX includes a valid user ID, even when you specify NONE as the security system for CA STX. With enhanced security, there is no pre- or post-security call in which to assign a default profile.