With CA Top Secret, you can protect logons, as well as ownable CA Top Secret resources such as the CP DIAL command, minidisks, VM readers, DCSSs, RSCS nodes, CP commands, diagnose codes, IUCV, VMCF, OS/DOS data sets, DASD volumes, and CPUs. This chapter also discusses how installation-defined resources can be either ownable or unownable.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |