If the rules defined for an ESM are equivalent to the rules defined for the native application command authorization facility, then the two configurations have the same level of security.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |