Resource control protects system resources from unauthorized access. Resources are valuable system services or objects that can affect the integrity of your system, such as group user IDs and certain commands, for example, the AUTOLOG command. CA ACF2 for z/VM lets you control access to resources by writing resource rules that name the resource, type of resource, and the users who can access that resource. As part of your initial implementation of CA ACF2 for z/VM, you should write resource rules to protect:
This section contains the following topics:
Protecting the AUTOLOG and XAUTOLOG Commands
Protecting IUCV, APPC/VM, and VMCF
|
Copyright © 2009 CA Technologies.
All rights reserved.
|
|