Previous Topic: Restrict Logical Unit Access

Next Topic: How Job Submission Works with CA Top Secret Enabled


How the Security Interface Works

When a file transfer request is received, the system and interface perform the following actions: