Previous Topic: Implementing Ownable Resource SecurityNext Topic: Implementing LOGON Protection


Resource Types

With CA Top Secret, you can protect logons, as well as ownable CA Top Secret resources such as the CP DIAL command, minidisks, VM readers, DCSSs, RSCS nodes, CP commands, diagnose codes, IUCV, VMCF, OS/DOS data sets, DASD volumes, and CPUs. This chapter also discusses how installation-defined resources can be either ownable or unownable.