TSO commands execute specific programs which need to be protected by CA Top Secret. To insure that an ACID does not gain access to a TSO command, establish ownership by adding the program to another ACID. At this point, additional users who want access to the program must be authorized to do so.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|