Previous Topic: Using Preset Terminal SecurityNext Topic: Securing Sequential Terminals


Restricting Terminal Access

CA Top Secret restricts selected VTAM, TCAM, and BTAM terminals from the use of unauthorized users. By defining a terminal or terminal prefix/node to CA Top Secret, and giving ownership to a user or group of users, only those people given permission to use a terminal can access CICS via that terminal. Any other user ACIDs attempting to use these terminals are logged off after signon.