TSO commands execute specific programs which need to be protected by CA Top Secret. To insure that an ACID does not gain access to a TSO command, establish ownership by adding the program to another ACID. At this point, additional users who want access to the program must be authorized to do so.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |