

Introduction › Security Considerations
Security Considerations
Because CA Verify for CICS is a CICS application, it is subject to whatever CICS security system you are using. In addition, CA Verify for CICS performs its own internal checking based on operator ID to ensure that test streams are accessed only by authorized users.
CA Verify for CICS also has these safeguards:
- You can specify read, write, or print protection for test streams and rulesets.
- You can specify that CA Verify for CICS not display the contents of dark (non-display) screen fields.
- Specific transactions can be globally excluded from test streams. Moreover, when you create an individual test stream, you can specify which transactions to include or exclude.
- You can include/exclude transactions by user ID.
Copyright © 2012 CA.
All rights reserved.
 
|
|