Previous Topic: Address Space Security BypassNext Topic: JES Considerations


VTAM and TCAM Terminal Definitions

All online terminals in a VTAM or TCAM network are associated with one‑ to eight‑character names for identification, definition, and control purposes. CA Top Secret uses these names to protect sensitive terminals and to provide SOURCE control for selected ACIDs. If these names are changed, security for them is defeated. Ensure the integrity of these names both internally in the machine, and externally in the terminal definition files.