CA Top Secret uses ACIDs to define the functional entities within the Security File. The ACID names used in the file must also follow a standard to simplify maintenance and to allow the definitions to be readily located for research and analysis. For example, you should be able to determine by the ACID name if the ACID is a user, a profile, a department, a division, or a security administrator.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|