Previous Topic: PlanningNext Topic: Controlling System Access


How Does CA ACF2 for z/VM Work?

The previous chapter introduced you to the concepts of default protection, controlled access, individual accountability, and separation of function. It also defined some of the key terms, such as logonids, access rules, and resources that we use to describe the components of CA ACF2 for z/VM.

This chapter builds on your understanding to provide more details about how CA ACF2 for z/VM secures your computer system.

This section contains the following topics:

Controlling System Access

CA ACF2 for z/VM Privileges

Controlling Access to Data

What is the User Identification String?

Controlling Access to Resources

CACIS and the CA Standard Security Facility (CAISSF)

What is Shared File System?

Protecting VM Data Spaces

Controlling CP Commands and Diagnose Instructions

What is a Diagnose Limiting Rule Set?

Providing Additional Controls

Entry Records

Scope Records

Shift Records

Zone Records

Defining System Options

User Exits

Administering CA ACF2 for z/VM

Issuing the ACF Command

Using the CA ACF2 for z/VM FullScreen Feature

Using the ACFSERVE Command

Centralized and Decentralized Security Administration

How Does CA ACF2 for z/VM Monitor Activity?

When Does CA ACF2 for z/VM Create SMF Records?

Report Generators

Utility Programs