Previous Topic: Defining User IDs for EmergenciesNext Topic: Using the Full-Screen Feature


Writing Access Rules

Access rules define the conditions under which access to data can or cannot occur. Only a security administrator or data owner can write access rules. This chapter focuses on how to write access rules and the CA ACF2 for z/VM features that can help simplify this important security component.

This chapter explains how to:

The SA and other personnel who are authorized to write rules should read this chapter.

This section contains the following topics:

Using the Full-Screen Feature

Setting the CA ACF2 for z/VM Mode

Writing Rules for the First Start-up

Writing the First Access Rules