Previous Topic: Logging OptionsNext Topic: Implementing Security


Auditing Options

Use CA Top Secret logging and auditing mechanisms to easily audit all defined users and ownable resources.

For defined users, add the AUDIT attribute to the ACID. For example:

TSS ADD(USER'5) AUDIT

For ownable resources (programs, subschemas, areas, and terminals) add the resource name or prefix to the AUDIT record, as shown below.

TSS ADD(AUDIT) AREA(TSTPAY)

You can access audited resources from all modes.