With CA Top Secret, you can protect logons, as well as ownable CA Top Secret resources such as the CP DIAL command, minidisks, VM readers, DCSSs, RSCS nodes, CP commands, diagnose codes, IUCV, VMCF, OS/DOS data sets, DASD volumes, and CPUs. This chapter also discusses how installation-defined resources can be either ownable or unownable.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|