Previous Topic: LIST

Next Topic: Security Planning


Security Considerations

This chapter discusses CA XCOM Data Transport security through various levels and interfaces.

This section contains the following topics:

Security Planning

Security Checking

Overview of Security

File Access Security

Partner Security

Command Security

History Database Security

Invoke a Security Interface

CA ACF2 Interface

CA Top Secret Interface

IBM RACF Security Interface

SAF Interface

Security Considerations for USS Files

Password Protection by Encryption

How Configuration File Password Encryption Works

Set Up Trusted Access Security

Data Encryption Using Secure Socket Layer (SSL)