Previous Topic: Internal SecurityNext Topic: Security Use Considerations


Overview

The user can define the security structure and level of authority for each individual allowed access to CA WA CA 7 Edition. Make a careful evaluation of security requirements before implementing CA WA CA 7 Edition.

The ability to control levels of authority is based on the CA WA CA 7 Edition SECURITY macro. You can define five distinct levels of security:

Each level of security or authorization provides further qualification (or restriction) of the preceding level. This definition means each level of security defined by the SECURITY macro requires that preceding levels are also defined. For example, to have authorization to perform a specific command within an application (Application/Command security), an operator requires authorization to use the application providing that command. You must define the first level of security (Terminal/Operator) before an operator is allowed to log on to CA WA CA 7 Edition.

Establishing the user-defined security structure is accomplished through the CA WA CA 7 Edition initialization process. The CA WA CA 7 Edition initialization file must contain a SECURITY statement. This SECURITY statement points to a load module containing the user's security definitions. The Security module identifies all operators authorized to log on to CA WA CA 7 Edition, which terminal each operator can use, and other authorization qualifiers necessary to limit the interface with CA WA CA 7 Edition. The definition of control provided can be modified whenever necessary because of changes in personnel, addition/deletion of terminals, and so forth. Because the initialization file pointing to this matrix is reloaded each time CA WA CA 7 Edition is initialized, the most current definition of the data center's security structure is always in effect.