CA Top Secret Security Algorithm Search Sequence


Article ID: 53200


Updated On:


CA Cleanup CA Datacom CA DATACOM - AD CA CIS CA Common Services for z/OS CA 90s Services CA Database Management Solutions for DB2 for z/OS CA Common Product Services Component CA Common Services CA Datacom/AD CA ecoMeter Server Component FOC CA Easytrieve Report Generator for Common Services CA Infocai Maintenance CA IPC Unicenter CA-JCLCheck Common Component CA Mainframe VM Product Manager CA Chorus Software Manager CA On Demand Portal CA Service Desk Manager - Unified Self Service CA PAM Client for Linux for zSeries CA Mainframe Connector for Linux on System z CA Graphical Management Interface CA Web Administrator for Top Secret CA CA- Xpertware CA Top Secret CA Top Secret - LDAP CA Top Secret - VSE



Where do I find information that explains the CA Top Secret security algorithm search sequence (ie user id, profile, ALL record)?


The search order is determined by the AUTH control option setting. See chapter 2 of the CA Top Secret Control Options Guide, section titled 'AUTH Merge Records for Search' for what each setting does. A TSS MODIFY can be issued to see the AUTH setting.

See the CA Top Secret User Guide, chapter titled 'The Resource Access Security Validation Algorithm' for how the security algorithm works in CA Top Secret.


Component: AWAGNT