Previous Topic: Resource Cache OperationNext Topic: How to Set CICSCACHE


Resource Cache Processing

When a resource validation is required, CA Top Secret scans the terminal's resource cache for the requested resource before asking the host CA Top Secret system to perform the validation. If the requested resource name does not match one of the resource cache entries, or if AUDIT is set and the cache entry is marked for audit, the host is asked to perform a normal resource validation. The result of the host resource validation determines whether the resource is added to the resource cache.