The results of the user inventory are input to the creation of users. It is often painful to postpone defining users until the Security File design has developed to this point. However, the existence of departments in which to define users and the existence of profiles to define access requirements for the users greatly simplify the actual definition of users to CA Top Secret.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|