This interface allows CA Top Secret to support full 44‑character data set name definitions and protection of tapes. In addition, many CA 1 unique resources and functions can be protected using CA Top Secret. CA 1 determines what is protected by using CA 1 parameter file options.
All resources used by CA 1 that can be protected by CA Top Secret are listed below. The list also includes a brief description of what security they provide.
Provides full 44‑character data set name protection; administered like disk data sets.
Controls commands for online users. The resource name is set to L0 plus the first six characters of the command name. Access to these CA 1 commands can be controlled: CLEAN, EXTEND, EXPIRE, RETAIN, DELETE, ADD, CHECKIN, and CHECKOUT.
Controls access to the CA‑1 Y SVC, which controls all direct access to the TMC and audit data sets.
Controls which users are permitted to NL, NSL, and BLP processing for tapes (whether they are under CA 1 control).
Controls 98000 (foreign) tape processing. These resources determine which users can read a foreign tape or write to a CA 1 tape having 98000 specified.
Controls the use of online user passwords that determine which internal fields can and cannot be updated.
In addition to securing the desired CA 1 resources, you must also:
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|