Previous Topic: Securing CA User Activity Reporting Module Using CA Access ControlNext Topic: CA IT PAM Considerations


Prerequisites

Before you create rules on CA Access Control, do the following:

Note: For information about installation procedures on Linux, see the CA Access Control documentation set.