CA Top Secret protects a wide variety of computer resources, but to protect them, CA Top Secret must know about them. The types of resources (such as data sets, volumes, terminals and minidisks) that CA Top Secret protects are listed in the Resource Descriptor Table (RDT). Many resource types are already automatically defined to the RDT at installation, however, you can add additional resource types (including site‑defined resources) by using the TSS ADDTO command.
Note: For a complete list of what is included in the RDT, see the Command Functions Guide.
The following list represents some of the most common types of resources CA Top Secret can protect.
|
Facilities |
Resources |
Commands |
|---|---|---|
|
VM |
Data sets |
TSO commands |
|
BATCH |
Programs |
<ROSCOE> commands |
|
TSO |
Terminals |
VM CP commands |
|
CICS |
Readers |
CA Product commands |
|
CA IDMS |
CPUs |
|
|
STC |
User resources |
|
|
CA Roscoe |
Operator commands |
|
|
IMS |
DASD volumes |
|
|
Other |
Tape volumes |
|
|
|
VM resources |
|
|
|
TSO resources |
|
|
|
DB2 resources |
|
|
|
CICS resources |
|
|
|
IMS resources |
|
|
|
CA IDMS resources |
|
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|