CA Top Secret Security Algorithm Search Sequence
search cancel

CA Top Secret Security Algorithm Search Sequence

book

Article ID: 53200

calendar_today

Updated On:

Products

Cleanup Datacom DATACOM - AD CIS COMMON SERVICES FOR Z/OS 90S SERVICES DATABASE MANAGEMENT SOLUTIONS FOR DB2 FOR Z/OS COMMON PRODUCT SERVICES COMPONENT Common Services CA ECOMETER SERVER COMPONENT FOC Easytrieve Report Generator for Common Services INFOCAI MAINTENANCE IPC UNICENTER JCLCHECK COMMON COMPONENT Mainframe VM Product Manager CHORUS SOFTWARE MANAGER CA ON DEMAND PORTAL CA Service Desk Manager - Unified Self Service PAM CLIENT FOR LINUX ON MAINFRAME MAINFRAME CONNECTOR FOR LINUX ON MAINFRAME GRAPHICAL MANAGEMENT INTERFACE WEB ADMINISTRATOR FOR TOP SECRET Xpertware Top Secret Top Secret - LDAP Top Secret - VSE

Issue/Introduction

Description:

Where do I find information that explains the CA Top Secret security algorithm search sequence (ie user id, profile, ALL record)?

Solution:

The search order is determined by the AUTH control option setting. See chapter 2 of the CA Top Secret Control Options Guide, section titled 'AUTH Merge Records for Search' for what each setting does. A TSS MODIFY can be issued to see the AUTH setting.

See the CA Top Secret User Guide, chapter titled 'The Resource Access Security Validation Algorithm' for how the security algorithm works in CA Top Secret.

Environment

Release:
Component: AWAGNT