This section contains the following topics:
Resource Access Considerations
Logical CA Top Secret Database Sharing with CPF
Identifying Cross-System Connectivity Controls
Using the Automatic Security File Backup
Removing Obsolete User Definitions and Entitlements
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|