8.0 Securing the Top Secret Driver
This section describes best practices for securing the Identity Manager 3.6.1 driver for CA Top Secret. Topics include
-
Section 8.1, Using SSL
-
Section 8.2, Physical Security
-
Section 8.3, Network Security
-
Section 8.4, Auditing
-
Section 8.5, Driver Security Certificates
-
Section 8.6, Driver REXX Execs
-
Section 8.7, The Change Log
-
Section 8.8, Driver Passwords
-
Section 8.9, Driver Code
-
Section 8.10, Administrative Users
-
Section 8.11, Connected Systems
For additional information about Identity Manager security, see the NovellĀ® Identity Manager 3.6.1 Administration Guide on the Identity Manager 3.6.1 Documentation Web site.