Be sure that your maintenance activity follows your original Security File design. Be careful that your profile structure is not compromised by numerous requests for update to user ACID records. Review each request to ensure that the request falls in the appropriate place in the Security File. It is possible that the requestor is unfamiliar with the structure and has requested an update for an inappropriate ACID. You might have to review the request with the requestor and modify the request before the update is actually made to the Security File.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|