At least one SCA must be created as the ACID used to perform routine maintenance. There is no limit to the additional SCAs that you can create as required by your organization. The scope of an SCA is all users and resources defined within the CA Top Secret Security File.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|