CA Top Secret protects a wide variety of computer resources, but to protect them, CA Top Secret must know about them. The types of resources (such as data sets, volumes, terminals and minidisks) that CA Top Secret protects are listed in the Resource Descriptor Table (RDT). Many resource types are already automatically defined to the RDT at installation, however, you can add additional resource types (including site‑defined resources) by using the TSS ADDTO command. See the Command Functions Guide for a complete list of what is included in the RDT.
The following list represents some of the most common types of resources CA Top Secret can protect.
|
Facilities |
Resources |
Commands |
|---|---|---|
|
VM |
Data sets |
TSO commands |
|
BATCH |
Programs |
ROSCOE commands |
|
TSO |
Terminals |
VM CP commands |
|
CICS |
Readers |
CA Product coommands |
|
CA‑IDMS |
CPUs |
|
|
STC |
User resources |
|
|
ROSCOE |
Operator commands |
|
|
IMS |
DASD volumes |
|
|
Other |
Tape volumes |
|
|
|
VM resources |
|
|
|
TSO resources |
|
|
|
DB2 resources |
|
|
|
CICS resources |
|
|
|
IMS resources |
|
|
|
Advantage CA‑IDMS resources |
|
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |