All online terminals in a VTAM or TCAM network are associated with one‑ to eight‑character names for identification, definition, and control purposes. CA Top Secret uses these names to protect sensitive terminals and to provide SOURCE control for selected ACIDs. If these names are changed, security for them is defeated. Ensure the integrity of these names both internally in the machine, and externally in the terminal definition files.
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|