ACIDs are the ACcessor IDs by which users are identified to CA Top Secret. An ACID can be up to eight alphanumeric characters long, which normally corresponds with the user's system userid. With CA Top Secret, you have the option of using the same ACID for all facilities or using a different ACID for each facility (that is, TSO, CICS, VM, and so on).
CA Top Secret recognizes several different types of ACIDs, ranging from a user to an entire zone. Together, these types comprise the basic hierarchical structure of your CA Top Secret security database. Each of these ACID types is then associated with a set of resource access authorizations.
The simplest, and generally, the most useful way to build your security database is to create a security hierarchy that mirrors your actual corporate structure. However, CA Top Secret does not limit you to this approach. The basic function of the corporate structure defined to CA Top Secret is to serve as a coordinating framework for security administration at your installation. Therefore, its design should be fundamentally dictated by what will best facilitate security implementation and maintenance.
The CA Top Secret hierarchy is constructed from seven ACID types:
These ACID types fall into one of two categories:
Functional ACIDs see User, Profile, Group, and Control ACIDs, and are used to perform specific tasks. Organizational ACIDs are Department, Division, and Zone ACIDs, and are used to construct the upper levels of your security hierarchy.
Functional ACIDs report to organizational ACIDs, while organizational ACIDs report to other organizational ACIDs. Organizational ACIDs never report to functional ACIDs.
| Copyright © 2009 CA. All rights reserved. | Email CA about this topic |