skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security OverviewSecurity Overview
go to beginning of chapter: Understanding System SecurityUnderstanding System Security
go to previous page: Building a Secure System EnvironmentBuilding a Secure System Environment
go to next page: Secure Sockets Layer (SSL)Secure Sockets Layer (SSL)
end of book navigation links

Common Data Security Architecture (CDSA) 



The Common Data Security Architecture (CDSA) is a multiplatform,industry-standard security infrastructure.

Starting with Version 7.3-1, HP provides CDSA as part of theOpenVMS Alpha operating system. CDSA is compatible with OpenVMSAlpha Version 7.2-2 and higher.

CDSA provides a stable, standards-based programming interfacethat enables applications to access operating system security services.With CDSA, you can create cross-platform, security-enabled applications. Securityservices, such as cryptography and other public key operations,are available through a dynamically extensible interface to a setof plug-in modules. These modules can be supplemented or changedas business needs and technologies evolve.

CDSA is security middleware that provides flexible mix-and-matchsolutions across a variety of applications and security services.CDSA insulates you from the issues of incorporating security intoapplications, freeing you to focus on the applications themselves.The security underpinnings are transparent to the user.

CDSA was originally developed by Intel Architecture Labs andwas released to the OpenSource community in May 2000. HP's CDSAimplementation is based on the Intel V2.0 Release 3 reference platform,which implements CDSA V2.0 with Corrigenda, as defined in The OpenGroup's Technical Standard C914, May 2000.

For more information about CDSA, see HP Open SourceSecurity for OpenVMS, Volume 1: Common Data Security Architecture(CDSA).


go to previous page: Building a Secure System EnvironmentBuilding a Secure System Environment
go to next page: Secure Sockets Layer (SSL)Secure Sockets Layer (SSL)