CA Top Secret provides security for the IMS resources:
For these resources to be protected, they must be owned. The standard set of CA Top Secret control features for owned resources is also available for IMS resources, including:
An ownable resource can be added to the AUDIT record, so that all activity involving it can be tracked. Resource ownership allows more comprehensive, flexible, and systematic security than a transaction-based security.
Note: The owner of an IMS resource should be a non-USER type ACID. When ownership is added in this way, the owner cannot sign on to use the resources defined, since TYPE=DEPT and other organizational type users are not allowed to sign on. However, if ownership is granted to an ACID with TYPE=USER, that user automatically has complete access to the resources which cannot be overridden by the commands:
TSS PERMIT ..... ACTION(DENY)
TSS PERMIT ..... ACCESS(NONE)
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|