CA Top Secret restricts selected VTAM, TCAM, and BTAM terminals from the use of unauthorized users. By defining a terminal or terminal prefix/node to CA Top Secret, and giving ownership to a user or group of users, only those people given permission to use a terminal can access CICS via that terminal. Any other user ACIDs attempting to use these terminals are logged off after signon.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|