Previous Topic: STEP 5Next Topic: Resource Access Incorrectly Denied


Resource Access Problems

This procedure provides instructions on how to diagnose access authorization problems for:

CA Top Secret uses an access algorithm to determine whether or not to grant a user the access that they requested to the resource. This algorithm is reviewed in Chapter 2. A thorough understanding of the algorithm, and the control options and commands which affect the algorithm, are prerequisites to the effective use of the following procedures and guidelines.

Use of the TSS LIST command function is a prerequisite skill. Refer to the Command Functions Guide for complete details.