As a best practice, we strongly urge customers to use all available external security options with CA WA CA 7 Edition. Use of external security to control access to CA WA CA 7 Edition resources lets you centralize the maintenance of security. Existing USERID definitions and data set access rules are used in the CA7ONL environment by using the full external security interface.
No special considerations are required when you are using CA ACF2 or CA Top Secret for the external security interface.
Business Value:
Following these guidelines optimizes access to product functions to help meet the requirements of your environment.
This section contains the following topics:
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|