Previous Topic: Resource MangersNext Topic: eTTS--Authentication


Identification

For identification, each control region and server region start procedure must have its own user ID and be defined in the STC record. Control regions are trusted, server regions are not. Because you should give differing resource authorizations to each, give different user IDs to control regions and server regions.

Additional user IDs are required for installation. Definitions for these user IDs are provided in the CA Top Secret sample. For information, see the customized instructions produced when you run the customization dialog.