Previous Topic: Controlling Access to DataNext Topic: What are Access Rule Sets?


What are Access Rules?

CA ACF2 for z/VM access rules define the conditions for data access. They specify who can access data and the terms under which the access can occur. Only a data owner or security administrator specifies when access is allowed. For example, a security administrator can specify a specific week or month, (5/22/99 to 5/29/99), or a time period, (9:00 A.M. to 5:00 P.M.) A data owner or security administrator can also specify if the access attempt is logged, allowed, or prevented. They can specify the type of access allowed. For example, a security administrator can specify whether the user has read, write, or execute access. You can find detailed information about writing access rules in the Administrator Guide.