Previous Topic: Use the CA Spool LPD Interface for Distributed File Archival and ViewingNext Topic: CA 1, CA TLMS, CA Vtape, CA Tape Encryption


Use CA ACF2 or CA Top Secret with the CA View external Security Interface

Protect and secure your business reports and data stored in the CA View database and tapes with CA ACF2 and CA Top Secret security systems. The security features in CA View provide extensive and complete security functions for every type of end-user database access.

CA View can be configured to activate security calls to CA ACF2 and CA Top Secret. CA View performs external security authorization based on a resource type and name. The resource type represents a predefined name, and the resource name identifies the data being accessed within the CA View database. The resource type and name correspond to the class and entity parameters of the RACROUTE macro. If a user is not authorized to access specific data within the CA View database, a violation is recorded and access is denied.

Business Value:

Prevent unauthorized access to your mission critical reports and data. Track and audit any violations found.

More Information:

For complete information about configuring CA View for CA Top Secret and CA ACF2, see the External Security chapter in the Reference Guide.