Previous Topic: Limited Access ACIDsNext Topic: Time of Use Monitoring


Restrict Signons to Specific Devices

CA Top Secret can control system entry by restricting access to:

Use the specific resource class name (CPU, TERMINAL, VMRDR, and NODES) as the keyword to determine access authorizations and restrictions for that resource.