

Introduction › Security Considerations
Security Considerations
Because CA Verify for VTAM is a VTAM application, it is subject to whatever VTAM security system you are using. In addition, CA Verify for VTAM performs its own internal checking based on operator ID to ensure that test streams are accessed only by authorized users.
CA Verify for VTAM provides important safeguards to protect against unauthorized use.
- Interfaces to most operating system security packages, such as RACF, CA ACF2 and CA Top Secret, are provided. These interfaces can be used to restrict access to authorized users.
- You can specify read, write, or print protection for test streams and rulesets
- You can specify that CA Verify for VTAM not display the contents of dark (non-display) screen fields.
- Specific applications can be globally excluded from test streams. Moreover, when you create an individual test stream, you can specify which applications to include or exclude.
Copyright © 2012 CA.
All rights reserved.
 
|
|