Previous Topic: CPF Journal FilesNext Topic: Security Files Among Networked Machines


Recovery and Accountability

CA Top Secret provides recovery processing services for the Security File through the TSSRECVR utility. (No other files can be recovered using this utility.)

TSSRECVR Utility

When you run TSSRECVR (the CA Top Secret utility that generates TSS commands to recreate the Security File), the TARGET is always local no matter what the original TARGET destination.

TSS Command Execution

Anyone with MISC2(TARGET) authority can enter a TSS command with a targeted destination. The command is executed at the remote machine under the authority the issuing ACID has on the remote node (regardless of his authority on the local node).

For example, ACID(HARRY) is defined as an SCA on his local machine, but on REMOTEB ACID(HARRY) is only a USER. Any command HARRY sends to REMOTEB is executed with his authority on REMOTEB— as a user.

Note: If the security administrator issuing the command does not exist on the remote node to which the command is being propagated, you will receive the following message:

TSS0324E ADMINISTRATOR'S ACID DOES NOT EXIST ON TARGET NODE

To avoid this error, you should ensure that the administrating ACID is defined to the remote node before any commands are issued to that node.