Use CA Top Secret logging and auditing mechanisms to easily audit all defined users and ownable resources.
For defined users, add the AUDIT attribute to the ACID. For example:
TSS ADD(USER'5) AUDIT
For ownable resources (programs, subschemas, areas, and terminals) add the resource name or prefix to the AUDIT record, as shown below.
TSS ADD(AUDIT) AREA(TSTPAY)
You can access audited resources from all modes.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|