Previous Topic: Security Plan ComponentsNext Topic: Product Training


Distributed Security

In a traditional, centralized environment, all processing is performed on the same system whether it is a mainframe, mid-range, or PC. Many installations, however, in order to remain competitive, have chosen to decentralize their operations and to diversify both their hardware and software packages. CA Top Secret VM, through the use of distributed security processing, allows these environments to continue maintaining the security and integrity of their data across multiple platforms without having to commit to extensive retraining.

Distributed security in CA Top Secret coordinates multisystem security by using the CA Common Communication Interface (CAICCI). CAICCI standardizes communication within connectivity software, thus enabling CA Top Secret to integrate individual security processes on different platforms.

An important part of distributed security in CA Top Secret is the Command Propagation Facility (CPF) which can route security administration to all or selected nodes either synchronously (CA Top Secret will wait for a response from each targeted node) or asynchonously (CA Top Secret will not wait for a response from each targeted node), resulting in single point administration. Changes made to ACIDs, passwords, or access levels, for example, can be propagated to all nodes to which the user is defined. Through the use of the CPFNODES, CPFWAIT and CPFTARGET control options, CPF defaults can be tailored to suit the needs of a particular security administration and policy.