The following table provides a summary of access operation by mode for use in predicting system action:
|
Function |
Mode |
Mode |
Mode |
Mode |
|---|---|---|---|---|
|
Signon Processing Required |
|
X |
X |
X |
|
Full Password Controls |
|
2 |
2 |
X |
|
Task Security Active |
|
3 |
X |
X |
|
Program Protection Active* |
|
3 |
X |
X |
|
Subschema Protection Active |
|
3 |
X |
X |
|
Area Protection Active |
|
3 |
X |
X |
|
#SRTT Defined Resource Protection |
|
3 |
X |
X |
|
Terminal Protection Active |
|
3 |
X |
X |
|
TSS Command Available |
X |
X |
X |
X |
|
Application Interface Available |
X |
X |
X |
X |
|
Logging Available |
|
X |
X |
X |
|
Auditing Available |
|
X |
X |
X |
All users in all conditions.
If explicit signon is performed.
For defined users only.
Messages and logging only.
Note the following:
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|