CA Top Secret provides a security call and verification interface for use by CA IDMS applications. The interface can be used to:
Note: Checks against unauthorized resources will not cause failure of the task; the application program handles the violation.
To invoke the CA Top Secret CA IDMS application interface, the application program must issue a link to program TSSMAI and pass it a request record that describes the processing to be performed by the CA Top Secret application interface.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|