Duration
5 hours
Overview
These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
Audience
Application programmers, systems programmers, database administrators, security administrators, and other personnel requiring knowledge about the use of the CA ACF2™ Security Server (ACF2) on the z/OS platform.
Prerequisites
Completion of the courses “CA ACF2™ Introduction” and “CA ACF2™ Protecting Data Integrity”, and knowledge of TSO, ISPF, data sets, and basic security requirements.
Objectives
After completing this course, the student will be able to:
- Define Scope lists and Shift records
- Define Source and Role cross reference records
- Identify and define SAF resources
- Manage Global System Option records
Course Content
Defining Scope and Shift Records
Defining Scope Lists
Defining Shift Records
Defining Cross Reference Records
Defining Source Groups
Defining Roles
SAF and CA-ACF2 Resources
CLASMAP Definitions
SAFDEF Records and SAF Resources
CA-ACF2 GSO Options and Commands
Displaying GSO Options
Maintaining GSO Options