CA Top Secret for mainframe z/OS

Posted on 2009-12-17
Last Modified: 2012-05-08
Does anyone know if CAIRIM must be completely loaded before starting the Top Secret Subsystem and Top Secret started task?

CAIRIM is delivered as part of CA's z/OS Common Services and the LMP component provides licensing services to many of CA's z/OS solutions.

Thank you.
Question by:jhufnagle
    LVL 57

    Accepted Solution

    I have not used Top Secret, but I have used other CA products that used LMP and they required CAIRIM to be loaded prior to them starting.  Without CAIRIM they can't verify they are licensed.

    Now, my personal opinion is that it would be poor design to require your security system to wait for a licensing manager to be started before it could be loaded and protecting your system.

    I would assume that this information would be in the Top-Secret documentation.

    Author Closing Comment

    Looking for a bit more information. I agree that the this CA Licensing product but, my question is that since Top Secret is also CA, does CAIRIM have to be loaded before the Top Secret subsystem loads?

    Thank you.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How to improve team productivity

    Quip adds documents, spreadsheets, and tasklists to your Slack experience
    - Elevate ideas to Quip docs
    - Share Quip docs in Slack
    - Get notified of changes to your docs
    - Available on iOS/Android/Desktop/Web
    - Online/Offline

    Suggested Solutions

    Title # Comments Views Activity
    How to create a PDS partitioned data set on mainframe 1 815
    week day of the year 5 479
    Printing from AS/400 to Kyocera 3 1,194
    ISeries command line access. 1 1,517
    Not sure what the best email signature size is? Are you worried about email signature image size? Follow this best practice guide.
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    Hi everyone! This is Experts Exchange customer support.  This quick video will show you how to change your primary email address.  If you have any questions, then please Write a Comment below!
    This video discusses moving either the default database or any database to a new volume.

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    12 Experts available now in Live!

    Get 1:1 Help Now