Previous Topic: Securing Resources

Next Topic: Ownership vs. Authorization

Securing Resources

CA Top Secret protects a wide variety of computer resources, but to protect them, CA Top Secret must know about them. The types of resources (such as data sets, volumes, terminals and minidisks) that CA Top Secret protects are listed in the Resource Descriptor Table (RDT). Many resource types are already automatically defined to the RDT at installation, however, you can add additional resource types (including site‑defined resources) by using the TSS ADDTO command. See the Command Functions Guide for a complete list of what is included in the RDT.

The following list represents some of the most common types of resources CA Top Secret can protect.

Facilities

Resources

Commands

VM

Data sets

TSO commands

BATCH

Programs

ROSCOE commands

TSO

Terminals

VM CP commands

CICS

Readers

CA Product coommands

CA‑IDMS

CPUs

 

STC

User resources

 

ROSCOE

Operator commands

 

IMS

DASD volumes

 

Other

Tape volumes

 

 

VM resources

 

 

TSO resources

 

 

DB2 resources

 

 

CICS resources

 

 

IMS resources

 

 

Advantage CA‑IDMS resources