CA Top Secret control options detail CA Top Secret operation in specific circumstances. It is a worthwhile investment of time to study the control options and their defaults before installation.
It is important to understand how CA Top Secret behaves even if you choose to install CA Top Secret with default control options. In most cases, you may choose to alter some of the defaults when you first install CA Top Secret.
The control options detailed below must be given special consideration before installation. These options generally affect CA Top Secret operation and must be reviewed for default operation. In addition to the general comments below, you can review the Control Options guide and the Implementation guide to thoroughly understand the effects of these options.
This control option identifies the data set name of the Audit File.
The AUTH control option controls the method of search in the CA Top Secret authorization algorithm. Once you have chosen the setting for this option and have begun your implementation, this control option may not be changed because it may change how your CA Top Secret definitions are searched. If changed, it may result in valid access against resources that were thought to be restricted. Careful thought must go into the setting of this option.
This option controls the CA Top Secret automatic backup feature. By default, CA Top Secret automatically takes a DASD backup of the main Security File at 1:00 a.m.. It is recommended that you use the automatic backup feature to allow for quick recovery of the Security File.
This control option identifies the data set name of the Backup File.
This control option allows you to format dates for report and display purposes. Although this option can be changed at any time, you might wish to set this option in the format most accepted in your environment before installation to avoid confusion when CA Top Secret begins to display messages.
The DOWN control option controls security for tasks initiating while CA Top Secret is down. The default allows the VM facility to revert to normal security while its address space is down. The DOWN option takes effect in all modes except DORMANT. Although you may not choose to change this setting, it is important to note that this is the way that CA Top Secret behaves when the CA Top Secret server is inactive.
By default, CA Top Secret initializes in FAIL mode. You might wish to change this at installation to DORMANT mode so that you can begin to use the TSS command to do administration without affecting your ongoing operation. This is the first phase in a gradual CA Top Secret implementation.
This control option identifies the data set name of the Recovery File.
This control option indicates if the CA Top Secret Recovery File is being used. CA Top Secret assumes that the Recovery File is being used if the RECFILE option is included in the CA Top Secret Parameter File. Include the RECFILE option in the CA Top Secret Parameter File if you intend to use the CA Top Secret Security File recovery procedure.
This control option identifies the data set name of the Security File.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|