User guide

Database Linkage Service
1-13
Resources to be Protected
The following table lists the resources used when the database linkage service is used. If high security
is required, it is desirable to protect these resources.
Table 1-7 Resources to be Protected
Function Resource to be protected
OTS system environment setup Folder storing the OTS system information
Transaction log file
Folder storing the trace log
Registration and deletion of a resource
definition file
Repository storing the resource definitions
Creation and deletion of a program for XA
linkage
Program for XA linkage
Creation and deletion of a resource control
program for OTS
Resource control program
OTS system operation Folder storing the OTS system information
Transaction log file
Folder storing the trace log
Operation of the resource control program
for OTS
Repository storing the resource definitions
Resource access information
Operation of the resource control program
for JTS
Repository storing the resource definitions
RMP property file
Resource access information
Folder storing the trace log
Application operation Repository storing the resource definitions
Resource access information
Folder storing the trace log
Manipulation of transaction Transaction log file
Folder storing the trace log
Resource access Resource access information
Folder storing the trace log