We recommend that you review the installation and configuration of CA Top Secret for z/OS before installing and configuring CA Top Secret Option for DB2.
Business Value:
CA Top Secret Option for DB2 leverages the security controls of CA Top Secret for z/OS to enable you to control access to DB2 resources, identify usage activity, violation activity, administrative activity, and so on. Because CA Top Secret for z/OS checks the actual resource authorizations, its installation and configuration dramatically affects the integrity and performance of CA Top Secret Option for DB2.
More Information:
For detailed product information, see the CA Top Secret for z/OS Best Practices Guide.
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|