CA Top Secret can be used to restrict the use of terminals to authorized users only. Furthermore, users can be restricted to signing on only from specific terminal/readers or accessing only particular CICS regions from certain terminals.
Unattended terminals can be protected against unauthorized access through automatic terminal locking. Moreover, cumulative security violation thresholds can be established that will automatically force terminal locking if this threshold is exceeded.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |