How Does CA Top Secret Work?

The purpose of CA Top Secret is to control access to resources by limiting system entry (through passwords and terminal restrictions, for example) and limiting how, when, and which resources a user can access once he enters the system.

As part of using CA Top Secret to secure your installation, the security administrator must design the security database. The following terms and their distinctions are important to understand the basics of CA Top Secret:

In addition, the security administrator is also responsible for the following:

CA Top Secret also provides the means for securing subsystems and facilities (such as VM, CICS, Advantage™ CA-Roscoe® Interactive Environment, Advantage™ CA-IDMS®, IMS and TSO), as well as for maintaining security across multiple VTAM-connected nodes through the Command Propagation Facility.


Copyright © 2009 CA. All rights reserved. Email CA about this topic