Security files that are identical can be defined to a remote site. Security files that are not identical make maintaining user information difficult. Consider using automatic propagation based on default nodes (DEFNODES) for ACIDs.
Security administration propagation can be:
The designated CPF control option values specified in each Parameter File determine the implicit target nodes used when a command is issued from that particular node. For example, if the CPF control options for NODEA identify implicit target nodes of NODEB, NODEC, and NODED, whenever a command is issued from NODEA that command is automatically sent to NODEB, NODEC, and NODED.
You can use the CPF command keywords to override the targets designated by the control options. For example, even though the control options for NODEA identify implicit targets of NODEB, NODEC, and NODED, you can use the TARGET keyword to indicate that a particular command should only be propagated to NODEB.
You can indicate that a command is processed:
Allows TSS commands to execute simultaneously throughout the network. CA Top Secret waits for the command response to return from the remote node before continuing.
Allows TSS commands to execute on a selective basis throughout the network. CA Top Secret does not wait for a response from each node to resume processing. All commands transmitted through asynchronous processing are retained in a CPF Recovery File.
These options are independent and can be used separately or together. The synchronous or asynchronous processing of commands and the specific targeted nodes are initially determined by control option settings. These values can be changed with TSS command keywords.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|