Lists ACID information including that contained in attached profiles. It can also list global (ALL) authorizations related to the accessed resource. Refer to the Command Functions Guide.
Lists the ACIDs which have access to the resource specified in the command. Refer to the Command Functions Guide.
Used to obtain event reports. Refer to the Reporting Guide.
Describes a logged on user’s security environment and important controls such as bypass attributes, log and message display options, and user’s mode. Useful for “on-the-spot” debugging. Refer to the Command Functions Guide.
The mode of the actual event, not always the user’s or facility’s mode. You must know the actual mode, be it facility, user, or event level. The only sure way of knowing the mode of a security event is through a trace. Refer to the Control Options Guide.
Basic understanding of the algorithm is mandatory for definition of proper authorizations. Refer to the General Concepts Guide.
Incorrect setting or changing of AUTH dramatically affects whether CA Top Secret grants access to a resource. Refer to the Control Options Guide.
LOG and FACILITY(LOG=) control CA Top Secret violation recording and message display. Refer to the Control Options Guide.
Explains when and why messages are displayed or suppressed. Appendix C describes the algorithm.
Controls message characteristics, such as when they are to be suppressed. Refer to the Control Options Guide for details.
The diagnostic trace can be employed to provide event-related details that cannot be uncovered by other tools. Appendix B explains how to interpret trace information. See TRACE in the ADD/REMOVE chapter of the Command Functions Guide and SECTRACE or FACILITY in the Control Options Guide for instructions on how to apply the trace.
Status of various control options and understanding of how they relate to or affect the behavior of Trust CA Top Secret Security. Refer to the Control Options Guide for details.
Attributes and status of facility controls. Refer to the Control Options Guide for details.
Controls or displays violation attributes, especially if your site has changed the effect of some violations. See DRC in the Control Options Guide, and DRC in the Messages and Codes Guide.
Generates internal control block dump. Appendix D documents how to interpret the output. See also DUMP in the Control Options Guide.
To obtain a maintenance level, and optional and special zap status.
|
Copyright © 2009 CA.
All rights reserved.
|
|