Previous Topic: Logging OptionsNext Topic: Signon Security


Auditing Options

Use CA Top Secret logging and auditing mechanisms to audit all defined users and ownable resources.

For defined users, add the AUDIT attribute to the ACID. For example:

TSS ADDTO(USER05) AUDIT

For ownable resources (APPLICATION, PSB, DBD, and Terminal) add the resource name or prefix to the AUDIT record. For example:

TSS ADDTO(AUDIT) APPLICATION(TSTPAY)

You can access audited resources from all modes.