This section contains the following topics:
Recovery Procedure for Automatic Backup
If the security file is damaged or lost, and CA Top Secret must be brought down, in order to start the recovery procedures, the ACID and password given after the P TSS command must belong to the MSCA (since it is the only ACID residing in storage).
Security file recovery is performed by applying the TSSRECVR routines to the backup security file. An up‑to‑date security file is reconstructed by applying, from the recovery file to the backup security file, all the changes that occurred since the last backup of the security file.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|