Access rules define the conditions under which access to data can or cannot occur. Only a security administrator or data owner can write access rules. This chapter focuses on how to write access rules and the CA ACF2 for z/VM features that can help simplify this important security component.
This chapter explains how to:
The SA and other personnel who are authorized to write rules should read this chapter.
This section contains the following topics:
Setting the CA ACF2 for z/VM Mode
Writing Rules for the First Start-up
Writing the First Access Rules
|
Copyright © 2009 CA Technologies.
All rights reserved.
|
|