Each CA ACF2 for z/VM user is assigned a system user ID called a logonid. The logonid identifies the user to CA ACF2 for z/VM. CA ACF2 for z/VM can trace suspicious activity, such as repeated attempts to access protected files or programs or excessive logon violations, to a specific individual. In this way, individuals are accountable.
Each logonid is protected by a password, known only to the owner. By correctly entering a password, a user lets CA ACF2 for z/VM know he is the person assigned to the logonid. At logon, a user must enter his logonid and password to gain access to the system. CA ACF2 for z/VM uses one‑way encryption to secure passwords. The management and auditing principle of individual accountability makes reporting activities especially important. You can tell CA ACF2 for z/VM to maintain an audit trail for any selected activities, applications, or users you want to examine. CA ACF2 for z/VM reports reveal if individuals are abusing their privileges.
|
Copyright © 2009 CA Technologies.
All rights reserved.
|
|