Previous Topic: Command Propagation FacilityNext Topic: Define a CPF Node in the NDT Record


CPF Architecture

Security files that are identical can be defined to a remote site. Security files that are not identical make maintaining user information difficult. Consider using automatic propagation based on default nodes (DEFNODES) for ACIDs.

Implicit and Explicit Targeting

Security administration propagation can be:

The designated CPF control option values specified in each Parameter File determine the implicit target nodes used when a command is issued from that particular node. For example, if the CPF control options for NODEA identify implicit target nodes of NODEB, NODEC, and NODED, whenever a command is issued from NODEA that command is automatically sent to NODEB, NODEC, and NODED.

You can use the CPF command keywords to override the targets designated by the control options. For example, even though the control options for NODEA identify implicit targets of NODEB, NODEC, and NODED, you can use the TARGET keyword to indicate that a particular command should only be propagated to NODEB.

Synchronous and Asynchronous Processing

You can indicate that a command is processed:

Synchronous

Allows TSS commands to execute simultaneously throughout the network. CA Top Secret waits for the command response to return from the remote node before continuing.

Asynchronous

Allows TSS commands to execute on a selective basis throughout the network. CA Top Secret does not wait for a response from each node to resume processing. All commands transmitted through asynchronous processing are retained in a CPF Recovery File.

These options are independent and can be used separately or together. The synchronous or asynchronous processing of commands and the specific targeted nodes are initially determined by control option settings. These values can be changed with TSS command keywords.