The following information is intended to show the actions that U7SVC performs during execution with relation to security. Two different paths can be taken. The path depends on whether there is an input stream with the U7SVC or if it is only a D= to post a data set.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|