

Implementing Security for CA IDMS › Special Considerations
Special Considerations
The following provides special considerations that administrators should keep in mind to ensure a thorough implementation of CA IDMS.
- Because CA IDMS is a multi-user address space system, it requires a restart of the region when applying maintenance.
- CA IDMS comes defined with two keys: KEY 8 for system use, and KEY 9 for user and system work areas. CA Top Secret requires both storage areas to be the same key. The FACILITY control option defaults to KEY=8.
- Since resource checks are now conditional, based on the parameters coded in the SRTT, considerations should be made to place control of this table with the security administrator.
- Access to CA IDMS must be granted by facility and the "signon resource". This is particularly important when adding new users.
- CA IDMS considers undefined (unowned) resources to be protected. Thus, all resources must be defined and permitted in FAIL and IMPL modes.
Copyright © 2013 CA Technologies.
All rights reserved.
 
|
|