Considerations for implementing CA Top Secret for CICS, IMS, and CA IDMS are similar because the security interfaces behave in a similar fashion. The transactions and resources available within CICS, IMS, and CA IDMS are basically the same resources available in TSO and CA Roscoe, but have different names. This table shows the relationship among the resources appropriate to each facility.
|
TSO/CA Roscoe |
CICS |
IMS |
CA IDMS |
|---|---|---|---|
|
Commands |
Transactions |
Transactions |
Task Codes |
|
Programs |
PPTs |
PSBs |
Sub‑Schemas and Programs |
|
Data Sets |
FCTs, DCTs, JCTs, TSTs |
DBDs |
Area |
The resources in CICS, IMS, and CA IDMS that are similar to data sets are treated as different resource types by CA Top Secret. The data sets made available to the regions of the different facilities are opened directly by the regions, and not by the users signing on to those regions. The region ACID controls access to the data sets, and the user ACID will control access to the resource type appropriate to that facility–for example, FCTs within CICS.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|