Security administrators use CA Top Secret command functions to communicate their administrative requirements to CA Top Secret. These requirements can range from the creation of an ACID to the definition of resource ownership.
CA Top Secret command functions are independent of the system facility. The security administrator uses command functions in the same manner, regardless of whether the facility is TSO, CICS, BATCH, CA‑Roscoe®, IMS, or CA‑IDMS®.
|
Copyright © 2009 CA.
All rights reserved.
|
|