Information for CA Top Secret is stored among many files and records which work together to provide an integrated security software package.
The files used by CA Top Secret to secure an environment are:
This file is an encrypted security database consisting of the Security Records that contain all user and resource permissions and restrictions. When a user initiates a job or signs on to an online facility in a VM, MVS, or VSE environment, CA Top Secret obtains the user’s Security Record from the Security File, and places it in the user’s address space for the duration of the session.
This file stores and defines control options at initialization, and sets up the operating environment for CA Top Secret. As was discussed earlier, control options are the tools that allow you to modify and customize the security environment.
This table contains all the facilities defined to CA Top Secret. Each entry contains information about the specific attributes associated with a particular facility (like VM, TSO, and so on), and can be viewed and modified with the FACILITY control option.
This file records security-related events and can be shared among CPUs. These events include violations, job and session initiation, and resource access. You can also designate an optional, alternate Audit/Tracking File to increase the amount of information that can be stored before the file fills up and begins to wrap.
This file stores the automatic daily backup of the Security File to ensure complete integrity of the security environment. The backup file is an exact copy of the Security File, as it existed at the time of last backup, and can be used if the Security File device becomes unavailable.
This file is a wraparound file that stores recent administrative commands depending on the size of the file allocated. The backup Security File with the application of select recovery file commands can completely restore a damaged Security File.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|