CA Top Secret accepts and validates all security-checking requests issued by the security calls inherent in VM’s access control interface. It also establishes additional interfaces when the standard access control interface is deficient. This is dependent upon the stability of the access control interface and of the existence of certain CP modules. When upgrading your VM system to a new release, it is recommended that you contact your CA Top Secret representative to ensure that your maintenance level of CA Top Secret is compatible with the new VM system.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|