Previous Topic: Using Suboptions or DFHSIT ParametersNext Topic: How to Track Execution of Transactions That Bypass Security Checking


The Bypass List

The Bypass List lets you avoid security checking by CA Top Secret for the resources you place on this list. Any resource that is not on the Bypass List is checked by default.

Since resource names added to the Bypass List are interpreted as generic prefixes, to perform security checking for a resource that begins with a generic prefix you must put the resource name on the Protect List.