

Security
Security
This section explains the internal and external security features including the following topics:
- Internal security
- Types and levels of security access
- Macros you use to define authorization criteria in the security table
- Syntax of the RMOAGRP macro
- Syntax of the RMOATH macro
- Syntax of the RMOAEND macro
- Coding macros
- External security
- Types of resources protected
- Levels of security access
- How to implement external security for CA Top Secret Security (formerly known as eTrust CA-Top Secret), CA ACF2 Security (formerly known as eTrust CA-ACF2), and the IBM RACF product
This section contains the following topics:
Internal Security
External Security
Copyright © 2013 CA.
All rights reserved.
 
|
|