Previous Topic: Controlling Access to ResourcesNext Topic: What are Resource Rule Sets?


What are Resource Rules?

Security administrators write resource rules to control access to resources. CA ACF2 for z/VM stores resource rules in records up to 4K on the Infostorage database. CA ACF2 for z/VM finds resource rules on the Infostorage database by finding their type and name. Resource types specify the category of resource that is being requested, such as group IDs. Resource names are one to 40 characters long and specify an individual resource in a given resource type. Resource rules specify who can access the type and name of a particular resource and the terms under which CA ACF2 for z/VM allows access.

Like access rules, a security administrator specifies when you can use a resource. For example, a security administrator can specify a specific week or month, (5/22/99 to 5/29/99), or a time period, (9:00 A.M. to 5:00 P.M.) A security administrator can also specify if using the resource should be logged, allowed, or prevented.