Previous Topic: Implementing Database ResourcesNext Topic: Invoking the Application Interface


Application Interface

CA Top Secret provides a security call and verification interface for use by CA IDMS applications. The interface can be used to:

Note: Checks against unauthorized resources does not fail the task; the application program handles the violation.