Previous Topic: SCOPE AuthorityNext Topic: Using Control Options


Modifying Your Security Environment

TSS commands are used to build your security database. Control options are used to define your security environment. How your security environment is designed can make a major difference in how CA Top Secret responds to both resource access requests and security violations. Through control options a Security Administrator can tell CA Top Secret:

A complete discussion on control options and managing your security environment can be found in your Control Options and Implementation Guide, but for the sake of brevity, this chapter will concentrate on only the following control options: