CA Top Secret allows the use of prefixing and masking for resource identification. Therefore, an administrator can enter multiple permissions to the same resource for the same user. A REVOKE command can remove a single or multiple permissions. CA Top Secret uses a security validation algorithm to determine whether a resource access request should be granted or denied. For information on this algorithm, see the User Guide.
|
Copyright © 2009 CA Technologies.
All rights reserved.
|
|