Previous Topic: Suspension of MSCANext Topic: Suggested SCA Authorities


Additional Central Security Administrators

At least one SCA must be created as the ACID used to perform routine maintenance. There is no limit to the additional SCAs that you can create as required by your organization. The scope of an SCA is all users and resources defined within the CA Top Secret Security File.