CA Top Secret

1 to 50 of 503 threads (1.6K total posts)
Thread Subject Replies Last Post
Using SORT for TSSCFILE output
7 24 days ago by Eileen Becht
Original post by Josef Thaler
How to revoke PRIVPGM (G)
2 26 days ago by Robert Bridges
how can I check which users have the segment WORKATTR
1 26 days ago by Robert Boerum
Original post by Bettina Malmberg
Digital Certificates
2 one month ago by Michael Simpson
New Instructor-Led Training (ILT) Now Available for CA Top Secret V16: Advanced Technical Security Mainframe and Distributed Integrations 300
0 one month ago by Angelica Giraldo
TSSINSTX dummy no longer installed for r16
1 2 months ago by Kris Horgen
Original post by Benjamin Burrows
XA VOLUME *ALL*(G) removal/change
7 2 months ago by ASHER ATZMONI
WRITE ONCE user-authorization for z/OS datasets
1 3 months ago by Eileen Becht
Original post by Josef Thaler
New Customer Documentation Platform
1 4 months ago by Lenn Thompson
Original post by Kris Horgen
Sharing of Tools, Tips, Tricks, JCL - A place to share what you have found useful that you would like to share with others for CA Top Secret (TSS)
0 4 months ago by Steve Hosie
AES256 SECFILE conversion 1 5 months ago by Michael Simpson
Original post by DAVID Low
Join us for next week's Mainframe Division Continuous Delivery Webast
1 5 months ago by Lenn Thompson
unable to allocate file when specifying storageclass
7 5 months ago by Eileen Becht
Original post by Vince Elliott
Top Secret - Defining zOS Connect to Top Secret 8 6 months ago by Maria Nable
Original post by Michael Simpson
Broadcom Mainframe Division Product Transition to Continuous Delivery – What You Should Know.
0 6 months ago by Lenn Thompson
Increase ACID Size 2 6 months ago by Robert Boerum
Original post by Mark Steely
Short Video: Access and Navigate Learning@Broadcom
0 6 months ago by Amy Flanagan
Transition to password phrases (by copying passwords into pw phrases) 2 7 months ago by FMGDave
Original post by Perit_
TSS and PingFederate 0 8 months ago by Fred Humphrey
TSS Disaster Recovery 3 9 months ago by Robert Boerum
Original post by Mark Steely
Adding WORKATTR eMail to an ACID 3 9 months ago by Robert Boerum
Original post by Tom Breuer
R_password errors in TSSOERPT utility 1 9 months ago by Robert Lynch
Original post by Michael Simpson
Artificial Intelligence Awareness Survey 2019
1 9 months ago by Eileen Becht
Original post by Leslie.McFarlin
ACF2 Access Provisioning for Sox.  3 10 months ago by Ken Suchomel
Original post by slo5oh88
Comment for IBM Rational Developer on CA TEC492091 when defining the RDZ JES JOB MONITOR started task: 3 11 months ago by Michael Simpson
How do I permit (allow) using a program in an lpar that shares security file with another lpar ? tried TSS ADD(DPROG) PGM(xxxxxxxx) and TSS PER(ALL) PGM(xxxxxxxx) CPU(SYSx) ...
5 11 months ago by ASHER ATZMONI
*Tip CA ACF2, How to implement DB2 Secondary Authorization IDs with ACF2 3 one year ago by Ken Suchomel
Original post by Michael Blaha
How do I get existing keys from .ssh/known_hosts and .ssh/authorized_keys into TSS.  We would like to use TSS as key manager/keystore for all Mainframe resident keys.
8 one year ago by JanoRompf
Original post by ken.porowski
TSS profile auditing 11 one year ago by Josef Thaler
Original post by bobby sagami
Securing CEMT SET/PERFORM/DISCARD 2 one year ago by BobBridges.real
Transition to Broadcom and a Pause in Our Virtual Events Programs
0 one year ago by Lenn Thompson
ISPW Security 3 one year ago by jbaker314
Original post by Mark Steely
TSS equivalent of RACF's UACC
8 one year ago by jbaker314
Original post by bobby sagami
After a PERMIT statement, some kind of refresh? 2 one year ago by BobBridges.real
interpreting TSS LIST outputs 24 one year ago by Josef Thaler
Original post by bobby sagami
Security Admin rights required for AUDITOR to Lis(*FACSTOR) 6 one year ago by jbaker314
Original post by steve.hosie.ctr
Can resource class SPI be made MASKABLE? 11 one year ago by jbaker314
Original post by BobBridges.real
How does the OS interact with the bit values in the RDT? 3 one year ago by Robert Boerum
Original post by BobBridges.real
Cleanup -- report on ALL resource types? 3 one year ago by Joseph Porto
Original post by Barry Schrager
STC entry for *MASTER* 1 one year ago by Robert Boerum
Original post by Fred Humphrey
TSS "priority" when reading the backup dataset 5 one year ago by BobBridges.real
TSS dump utility 3 one year ago by BobBridges.real
Original post by bobby sagami
TXACTYPE value for SCA in TSSINSTX 2 one year ago by ASHER ATZMONI
IBM support for TSS 0 one year ago by Steve Mann
ACF2 naming convention
1 one year ago by Ken Suchomel
Original post by cs_juke
Define  ZOSMF Facility to CA Top Secret 17 one year ago by Kris Horgen
Original post by Mark Steely
Eliminate default gid 1 one year ago by Robert Lynch
Original post by Vince Elliott
ACID(<acid>) or SURROGAT(<acid>.SUBMIT)? 4 one year ago by jbaker314
Original post by BobBridges.real
Top Secret Hyper Solution SO04627
0 one year ago by Eileen Becht
Protecting JES2 NJE NODES 0 one year ago by ASHER ATZMONI