CA Top Secret provides a security call and verification interface for use by IMS applications. The interface can be used for:
Checks against unauthorized resources do not cause failure of the task. Handling of the violation belongs to the application program.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|