Previous Topic: Modes of OperationNext Topic: Violation Thresholds


Modes Defined

The following descriptions define the purpose and operation of each mode:

DORMANT

In DORMANT mode, CA Top Secret will not perform any security checking and will not generate violation messages.

Note: When running in DORMANT mode, DORMPW causes passwords to be checked by both CA Top Secret and CA‑Roscoe. This might cause problems if the passwords are not synchronized within the two products. To prevent problems, use NODORMPW in DORMANT mode and let CA‑Roscoe maintain the passwords.

WARN

In WARN mode, CA Top Secret performs full security checking but will not actually fail the user. All users must explicitly sign on or be signed on through the Automatic Terminal Signon feature. Violation messages are not generated.

IMPLEMENT

In IMPLEMENT mode, CA Top Secret provides full security for defined users and resources, but undefined users will still be allowed to sign on to CA‑Roscoe. Resource security is in effect for all users. Protected resources are not accessible to undefined users unless the resource has been permitted to the ALL record for global access. This mode allows for a gradual migration of users to CA Top Secret control. This mode also generates violation messages.

FAIL

In FAIL mode, CA Top Secret requires that all users be defined to CA Top Secret. This mode generates violation messages.

Note: With the availability of four different security modes, security administrators can carefully control the pace of the implementation of security in the CA‑Roscoe environment.