Previous Topic: Using ACF CHANGE to Change the PWPHRASE FieldNext Topic: Why You Need Access Rules


About Access Rules

CA ACF2 for VM protects all data by default. This means that no one can access (read, write, or execute) a file other than the owner of the file or a security administrator unless an access rule exists that specifically allows the access. CA ACF2 for VM automatically protects all data. CA ACF2 for VM provides for controlled access to data through access rules.

An access rule entry is a statement that defines the data you want to protect, who can access that data, and what type of access they can have (can they just look at the data, or can they change it). As you become more familiar with
CA ACF2 for VM, you can limit when users can access the data, and where they can access the data from. There are many other limitations you can put on users, and you will learn about those later in this guide.

An access rule set is a collection of rule entries that apply to one element. An element can be all of the minidisks a user ID owns, or the high level index of VSE or OS/390 data sets. The rule set name, or $KEY value, is a user ID or the high level index of a data set name. The easiest way to think of a rule set is that it is a file that contains rules that allow or prevent others from reading or changing your data.

Writing access rules for all data on CA ACF2 for VM may seem like a complicated task at first, but keep in mind these three important features:

When you finish this chapter, you will know

This section contains the following topics:

Why You Need Access Rules

Using Masking in Access Rules

Access Rule Masking

Using NEXTKEY