Previous Topic: Contact CA TechnologiesNext Topic: Security Implementation Considerations


Introduction to Security

This guide describes the steps necessary to implement CA Workload Automation CA 7 ® Edition (CA WA CA 7 Edition) security.

Note: Because this document contains sensitive information, we recommend that you limit the distribution of this guide. Give access to those employees responsible for implementation and maintenance of CA WA CA 7 Edition security.

CA WA CA 7 Edition security provides a control structure that enables each installation to protect data and resources being accessed through CA WA CA 7 Edition. Two options are available when implementing security:

Use of external security to control access to CA WA CA 7 Edition resources lets you centralize maintenance of security. If the external security interface is used, you can extend existing USERID definitions and data set access rules for use in the CA WA CA 7 Edition environment.

CA WA CA 7 Edition internal or "native" security can control data and resources that are unique to the CA WA CA 7 Edition processing environment.