The following topics provide examples of CA Top Secret commands that can be used to implement CA WA CA 7 Edition external security.
Note: For more information about the commands listed in this chapter, see the CA Top Secret Command Function Guide (for z/OS).
The security definitions provided in this section are recommendations for establishing your CA WA CA 7 Edition security environment. Each site is responsible for determining whether these recommendations meet local auditing and security standards.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|