Previous Topic: Use CA TPX Security to Access CA STXNext Topic: Additional Security Options


Enhanced Security Process

With enhanced security, the following process takes place when users access CA STX:

  1. The user selects CA STX from the Menu.
  2. The product transmits the VTAM logon data, with a special token concatenated in front.

    In both cases, the product scrambles and encrypts the data to secure the user's password.

    Although data is encrypted, enhanced security does not use the product's encryption exit.

  3. CA STX decrypts and unscrambles the logon data and saves the password in its re-encrypted form.
  4. CA STX bypasses the signon security call unless the following conditions exist: