Previous Topic: Identify Your Security RequirementsNext Topic: Logon


Security Structure Using External Security

The External Security Interface provides key functional control points that are used to determine access authority for users of CA WA CA 7 Edition. The control points are as follows:

When access to a given resource is attempted, a security check is performed to determine the authority of the user initiating the request. The security definitions in place at the time of the access determine the authority of the user to access the data or resource. For a description of the control points, see the following topics.