• DB2 Secondary Auth ID Validation for ACF2

    score1
    New
    1 vote
    Currently, during DB2 authorization, if a DB2 Secondary Auth ID does not have a defined ACF2 Logonid of the same name, the ACF2/DB2 process ignores the error and proceeds.  The problem is that the ACF2 ...
    Barry.Schrager.1
    last modified by Barry.Schrager.1
  • [WEBCAST] Resolving Emerging Security Directives With High-Performance Cryptography for CA IDMS Databases – June 11, 2019 @ 11 a.m.  ET

    Managing cryptography for applications using CA IDMS becomes especially challenging when considering the expanding scope of cryptography and key management policies along with auditing mandates. Fortunately, there is ...
    Lenn Thompson
    created by Lenn Thompson
  • Increase ACID Size

    I am increasing the ACID size (MAXACIDSIZE & ORGACIDSIZE). I have performed this on several TEST Lpar's. The last step of the process says an IPL is required. I did this on the first TEST LPAR and it was successfu...
    steely.mark
    last modified by steely.mark
  • Allow An ACID Besides The MSCA To Find NOPW ACIDs

    score8
    New
    8 votes
    We do not want to have to use the MSCA ACID to do a TSS LIST(ACIDS) DATA(PASS) to determine whether or not an ACID has NOPW. This would be useful for getting important information without the elevated risk of cross au...
    BobBoerum
    last modified by BobBoerum
  • REMINDER: This Site Becomes Read-Only on May 24 at 9 a.m. ET

    Good morning, everyone. This post is just a quick reminder that this Friday, May 24 at 9 a.m. ET this site will become read-only in preparation for our final content migration and the creation of the new Broadcom Comm...
    Lenn Thompson
    created by Lenn Thompson
  • ACF2 Interfaces/APIs

    For a very long time mainframe was a monolith and ACF2 (or any other ESM) just was a standalone entity managed by ACF2/mainframe specialists.   In the last years things have changed a lot, mainframe be...
    kristof.goossens1.1
    last modified by kristof.goossens1.1
  • Extend TSS Acid Name Length

    score8
    New
    8 votes
    It would be helpful if the TSS Acid name field could be enlarged from 32 characters to 255.  Some descriptions do not fit easily in the 32 characters which are currently available.  For example, for per...
    JonathanChapman4451064
    last modified by JonathanChapman4451064
  • Adding the identity of the logonid that CREATED/INSERTED a logonid to the LID

    score2
    New
    2 votes
    It would be nice to see the UserID which has created/inserted an user account. There could be added a CRE-USR field along with CRE-TOD filled with the creating/inserting UserID at creation time....
    oberleitner
    last modified by oberleitner
  • program pathing for resources

    score2
    New
    2 votes
    It would be great if resources especially db2 resources accepted program pathing.  I have a case now where I want an id to have dbadm and create tab but only if it's scheduled, we don't want people to set their c...
    KSmith
    last modified by KSmith
  • seemless password-to-passphrase functionality

    score5
    New
    5 votes
    Pershing requests that CA provide a TSS solution that will allow the user to freely switch between an 8 and 20+ character password. new password   should be 8-20+ characters in length REGARDLESS of whether ...
    pharmaty
    last modified by pharmaty
  • TSS Advanced Authentication Mainframe

    score3
    New
    3 votes
    Add support for Symantec VIP 2-factor tokens.
    SMann
    last modified by SMann
  • Add access level to message TSS7250E / TSS7257E

    score4
    New
    4 votes
    Currently TSS7250E and TSS7257E report unauthorized access to a resource but do not say what access level was requested.  We recently had a user get TSS750E for a resource that they had READ access too but the re...
    SMann
    last modified by SMann
  • Sample-Rexx to list Top Secret profile acid name and acids plus their names

    josef.thaler
    last modified by josef.thaler
  • Automatic Loading of CA Certificates

    score3
    New
    3 votes
    Hi,   We need a functionality that, CA Top Secret automatically discovers and loads Certificate Authority certificates from known CAs like Verisign.    Thank you,   Erdem.
    FaikErdem
    last modified by FaikErdem
  • [ROADMAP] CA Data Content Discovery Product Roadmap – May 16, 2019 @ 11 a.m. ET

    5/16/19 3:00 PM
    Join our CA Data Content Discovery on May 16, 2019, at 11 a.m. ET to get a clear view of what’s coming down the road for the product, including details on upcoming product functionality, features,...
    Lenn Thompson
    last modified by Lenn Thompson
    [ROADMAP] CA Data Content Discovery Product Roadmap – May 16, 2019 @ 11 a.m. ET

    Appears in 7 other places

    Back
  • CA Communities Migration Update: Important Dates and a Reminder

    Dear CA Communities Members,   This is a reminder that as part of the transition to Broadcom, the CA Communities will be moving to a new platform on June 6, 2019. (See my previous post for more details: Comm...
    Lenn Thompson
    created by Lenn Thompson
  • [REGISTRATION OPEN] Mainframe Technical Exchange: Plano, TX – Oct. 15 - 17, 2019

    The Plano Mainframe Product Management and Development teams will host a Mainframe Technical Exchange October 15 - 17, 2019, which is FREE for customers.   Don’t miss this great opportunity for in-dept...
    Lenn Thompson
    created by Lenn Thompson
  • AES256 SECFILE conversion

    Hello, We are planning on moving from AES128 to AES256 SECFILE. We have applied APARs SO00168 and SO00169 to address performance issues. I'd like to hear from others who have done this conversion on a syste...
    low.david
    created by low.david
  • Integrate Data Content Discovery with Data Classification records

    score8
    New
    8 votes
    Add automation to DCD so that, based on results, an ACF2 or Top Secret Data Classification Record is created that documents the results of a positive scan (i.e., label file as PHI, PCI, PII, etc.) Allow for mapping of...
    humma03
    last modified by humma03
  • Transition to password phrases (by copying passwords into pw phrases)

    Hello everyone,   The company we're working with started considering the use of password phrases with greater complexity instead of passwords. I made some changes in a test environment and put new password phras...
    Perit_
    last modified by Perit_