A rule determines whether the action requested by one requester that affects another user ID is allowed. With each request, a user ID or terminal address (the requester) issues a command to gain access to resources (the target) owned by another user ID.
This section contains the following topics:
Using a Rules Database to Secure Your Site Resources
Assigning User IDs to Security Groups
Removing User IDs from Security Groups
Making Temporary Security Group Changes
Displaying Rules and Security Group Membership
Recording and Reviewing Access Attempts
Accountability of Group User IDs
Controlling the CP LINK Command
Enabling CP LOGON BY When CA VM:Secure is Unavailable
Controlling CA VM:Tape Commands
Controlling CA VM:Schedule Commands
Additional Security Processing
CA VM:Secure Journal Facility and CP Journaling
|
Copyright © 2014 CA.
All rights reserved.
|
|