This screen is for testing rules and to assist you in verifying that the rules do what you want them to do. Enter the information you want to test on this screen.
M9PA‑2520 Test a MVS/VSE Data Access Rule (2.5.2) CA ACF2 for VM COMMAND ===> ______________________________________________________ TIME 17:12 What is being accessed: Rulekey ==> ________ Volume ==> ________ Data set Name ==> ____________________________________________ Who is attempting the access: Logonid ==> ________ or UID ==> _______________________ DDNAME ==> ________ Program ==> ________ Library ==> ____________________________________________ When and where is this access occurring: Date ==> ________ Time ==> _____ Source ==> _______ Test results: READ access : _________ By Rule Entry : ____ WRITE access : _________ EXECUTE access : _________ ALLOCATE access : _________ PF1=Help 2=Print 3=Quit 4=Return 5= 6=MVS<‑>VM PF7= 8= 9=Director 10= 11= 12=Retrieve
Specifies the key value of the rule set. The rulekey you specify can be up to eight characters long. You cannot mask this field.
Specifies the volume of the data set.
Specifies the name of the data set.
Specifies the logonid of the user.
Specifies a pseudofield concatenation of selected information from the logonid record that can include information from user‑defined fields, such as company code, department, job function, and the logonid field.
Specifies the ddname to be accessed.
If applicable, enter the program name attempting the simulated access.
Specifies the library name for the attempted access.
Specifies the date (in the format mm/dd/yy, dd/mm/yy, or yy/dd/mm, depending upon the DATE field in the OPTS VMO record) that the access was attempted.
Specifies the time of the simulated access.
Specifies an input source or source group name where this rule should apply. For example, you can specify the ID of a terminal. The access is allowed only if the user logs onto the specific terminal. If you do not specify a source, any input source is valid. Ask your security administrator for a list of valid source group names (optional).
The access permission is displayed following the access type.
Specifies the access is allowed.
Specifies the access is allowed but logged.
Specifies the access is denied.
Specifies the rule entry line number that applied to the simulated access.
|
Copyright © 2009 CA Technologies.
All rights reserved.
|
|