Customization is used to modify CA Top Secret behavior to meet special customer requirements through the CA Top Secret installation exit.
The installation exit provides initiation, validation, logging, message, CA Top Secret Security File change, and other exit points for user routines. Customization at this level has been successfully done to add features to CA Top Secret. The exit has been used to:
Of course, customization using the installation exit is not limited to the examples detailed. However, it is strongly recommended that the installation exit not be used to bypass security, or to change CA Top Secret behavior to behavior that does not complement documented CA Top Secret features.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|