Previous Topic: Implementing SecurityNext Topic: Signing On Using CESN


Signing On to CICS Under CA Top Secret

Signon/signoff procedures are different for each site, so it is recommended that your security administrator provide the user community with any operating system signon/signoff requirements and the CA Top Secret procedures discussed in this section.