

Compliance Information Analysis Reports › Compliance Report - List Resources by Role or User › Benefits of the List Resources by Role or User
Benefits of the List Resources by Role or User
The List Resources by Role or User report is generally equivalent to the TSS LIST(acid) command, which shows the attributes, resource ownership, and resource access permitted to the user or profile.
Advantages of the report over issuing CA Top Secret commands are:
- In a multiple system image environment, the report can be run for more than one system image. To obtain the same information using the TSS command, the command must be issued in each system image and the information correlated manually.
- If a user has more than one ACID in a single system image, or different ACIDs in different system images, the report can be run using a global ID. This obtains each ACID associated with the user, and reports on the resources authorized for each ACID. To obtain the same information using the TSS command report, the command must be issued for each ACID and the information correlated manually.
- The report displays only the resource access information for the role or user. The TSS command displays additional information, and the special attributes, resource ownership, and resource authorizations must be extracted from the information.
Copyright © 2013 CA Technologies.
All rights reserved.
 
|
|