Security

Users require no special privileges to run GT.M beyond standard system access and suitable access to relevant application and database files. All the standard UNIX/OpenVMS security features are available to protect GT.M resources.

FIS strongly recommends a security design where each user has no more authorizations than they require to do their assigned roles and each user's actions are distinguishable in an audit.

[Note]

System account access is required to install GT.M, but not to use it.