Previous Topic: Protect and Permit Scope Protection Resource Definitions

Next Topic: How You Set Global PROTECT and PERMIT Commands

How You Use PROTECT and PERMIT Commands

Use the PROTECT and PERMIT commands together to control which commands, keys, and eligible utilities users have access to on the BES subsystems in your environment. The following points outline this process:

  1. Define the command, key, or utility to the security system
  2. Define permit and protect options.

Note: If a resource is not defined to the security system, and either PERMIT is in control or the SAF Interface is not being used, it is considered to be available for all CA Tape Encryption users.