Previous Topic: Application InterfaceNext Topic: Task Checking


Invoking the Application Interface

CA Top Secret provides a security call and verification interface for use by CA IDMS applications. The interface can be used to:

Note: Checks against unauthorized resources will not cause failure of the task; the application program handles the violation.

To invoke the CA Top Secret CA IDMS application interface, the application program must issue a link to program TSSMAI and pass it a request record that describes the processing to be performed by the CA Top Secret application interface.