The first mode used in any implementation is DORMANT mode. This is the recommended mode in which to introduce yourself and your organization to CA Top Secret by inputting your Security File structure through the TSS command without affecting users’ access to resources. Once you begin to define users, and you wish to bring them under CA Top Secret control either for research or for actual protection, it is time to choose one of the implementation modes: WARN or IMPLEMENT.
|
Copyright © 2009 CA.
All rights reserved.
|
|