Previous Topic: Controlled Access to Data and ResourcesNext Topic: Separation of Function


Individual Accountability

Each CA ACF2 for z/VM user is assigned a system user ID called a logonid. The logonid identifies the user to CA ACF2 for z/VM. CA ACF2 for z/VM can trace suspicious activity, such as repeated attempts to access protected files or programs or excessive logon violations, to a specific individual. In this way, individuals are accountable.

Each logonid is protected by a password, known only to the owner. By correctly entering a password, a user lets CA ACF2 for z/VM know he is the person assigned to the logonid. At logon, a user must enter his logonid and password to gain access to the system. CA ACF2 for z/VM uses one‑way encryption to secure passwords. The management and auditing principle of individual accountability makes reporting activities especially important. You can tell CA ACF2 for z/VM to maintain an audit trail for any selected activities, applications, or users you want to examine. CA ACF2 for z/VM reports reveal if individuals are abusing their privileges.