

Special Features and Customization Tasks › How to Customize Security › Enhanced Security Process
Enhanced Security Process
With enhanced security, the following process takes place when users access CA STX:
- The user selects CA STX from the Menu.
- The product transmits the VTAM logon data, with a special token concatenated in front.
- Logon data is transmitted as token/userid/password if there is no session data defined for CA STX in the ACT
- Logon data is transmitted as token/session data if session data is defined.
In both cases, the product scrambles and encrypts the data to secure the user's password.
Although data is encrypted, enhanced security does not use the product's encryption exit.
- CA STX decrypts and unscrambles the logon data and saves the password in its re-encrypted form.
- CA STX bypasses the signon security call unless the following conditions exist:
- You specified USER as the type of security. In this case, the call allows you to customize CA STX security.
- You specified that file security be done under RACF or CA ACF2. In this case, the file cannot be opened without the call.
Copyright © 2013 CA.
All rights reserved.
 
|
|