Previous Topic: Command FunctionsNext Topic: Common Components


CA Top Secret Components

Within CA Top Secret, distributed security can include:

Command Propagation Facility (CPF)

Routes security administration to all or selected nodes synchronously or asynchronously, resulting in single-point administration. Changes made to ACIDs, passwords, or access levels can be propagated to all nodes to which the user is defined. For example, USER01 is defined to two nodes, with NODE A as the local node and NODE B as the remote node. If the user changes the password on NODE A, CPF automatically propagates the change to NODE B. Through the use of command function keywords, you can specify which node receives these commands and how the local node processes them.

SYSPLEX XES and XCF (z/OS only)

Protects systems running in a sysplex environment:

XES

Shares security file records throughout the sysplex for all of CA Top Secret.

XCF

Allows CA Top Secret information to be communicated between systems. XCF is a message router.

CA Top Secret for DB2 (z/OS only)

Protects several DB2 resources and replaces GRANT/REVOKE processing. PERMIT commands are written in place of GRANT commands and a conversion utility provides a transition. A catalog synchronization utility brings DB2 catalog entries up-to-date with CA Top Secret for DB2 authorizations.

APPC

Can control access to z/OS from other systems. For example, you can limit which LUs to use for conversation processing, what type of security data the inbound transaction program must provide, and which users are authorized to execute the transaction program.

CA Top Secret WorkStation (z/OS only)

Provides: