Previous Topic: Password Validation

Next Topic: Authorization Restrictions

Terminal Security

CA Top Secret can be used to restrict the use of terminals to authorized users only. Furthermore, users can be restricted to signing on only from specific terminal/readers or accessing only particular CICS regions from certain terminals.

Unattended terminals can be protected against unauthorized access through automatic terminal locking. Moreover, cumulative security violation thresholds can be established that will automatically force terminal locking if this threshold is exceeded.