To use CPF, the security administrator must first be aware of all remote CPUs and the ACIDs defined to them. Most Security Files are essentially identical; those defined to one site can be defined to a remote site as well. Security Files that aren't identical can have additional ACIDs, permissions, and/or resource ownership definitions which must be taken into account. This can become a difficult task for the security administrator responsible for maintaining user information. If this is the case, you may want to consider using automatic propagation based on default nodes (DEFNODES) for ACIDs.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |