Previous Topic: Testing Resource RulesNext Topic: Maintaining Resource Rules with the ACF Command


Testing a Resource Rule Set

CA ACF2 for VM displays this screen if you selected option 5, Test a Resource Ruleset, from the Resource Control (3) screen. This screen lets you select resource rules for testing. To see this screen, enter the $KEY of the rule set that you want to test.

M9HE‑3510 Test a Resource Ruleset (3.5.1) CA ACF2 for VM COMMAND ===> _______________________________________________________ TIME 17:13 What is being accessed: Resource type ==> Rulekey ==> Who is attempting the access: Logonid ==> ________ or UID ==> ______________________ When and Where is this access occuring: Date ==> ________ Time ==> _____ Source ==> ________ What SERVICE is requested: Read ==> Add ==> Update ==> Delete ==> Test results: Access : By Rule Entry : PF1=Help 2=Print 3=Quit 4=Return 5= 6= PF7= 8= 9= 10= 11= 12=Retrieve

What is Being Accessed

Resource type

Specifies the three‑character type code that defines the type of resource protected by this rule set.

Rulekey

Specifies the $KEY value of the rule set. The $KEY control statement supplies the name of the resource that this rule was written for. A resource rule name can represent many different objects, depending on the resource TYPE.
CA ACF2 for VM‑defined type codes are ACT, ALG, GRP, DIA, IUC, and VMC. For more information on these type codes, see the “About Resource Rules” chapter. For example, for DIA, the $KEY rule ID is the ID of a user in the VM directory that another user wants to dial to. For ACT, the $KEY rule ID is an eight‑character account code that you define. The rule ID can be up to 40 characters long. However, for most CA ACF2 for VM‑defined resource types, only the first eight characters are significant. You can mask this field with standard CA ACF2 for VM masking characters.

Who is Attempting the Access

Logonid

Specifies the logonid of the user attempting the access.

or

UID

Specifies a pseudofield concatenation of selected information from the logonid record that can include information from user‑defined fields, such as department, job function, and the logonid field.

Note: Pick only one of these fields. If you select both fields, CA ACF2 for VM uses the logonid field.

When and Where is This Access Occurring

Date

Specifies the date (in the format mm/dd/yy, dd/mm/yy, or yy/dd/mm, depending upon your preference) that the simulated access is attempted.

Time

Specifies the time of the access.

Source

Specifies the source of the simulated access.

What SERVICE is Requested

SERVICE request types

Specifies the type of access associated with the request. If you have defined local resources at your site, you must complete this field. CA ACF2 for VM‑defined resources do not use this field.

In the SERVICE request types field, enter a single character response following each service permission. For example, to allow TLCAMS read access to a specific volume, but prevent all other permissions, enter Y after the ==> in the Read field of the SERVICE request types field like this:

SERVICE request types:
  Read    ==> Y
  Add     ==> N
  Update  ==> N
  Delete  ==> N

Test Results

The access permission is displayed following the access type. Valid options are ALLOW (allow access to the resource), LOG (allow access, but record the action), and PREVENT (do not allow access). The By rule entry field indicates the rule entry line number for the access.