The design philosophy of CA ACF2 for z/VM states that all data and resources are protected by default. CA ACF2 for z/VM is shipped with a default mode of ABORT. However, you can phase in data protection gradually, enabling you to implement access control without a security exposure.
There are two methods that you can use to convert from an environment with no security to one with full security under CA ACF2 for z/VM. These are system‑wide conversion and selective migration. We explain both methods in this chapter.
This section contains the following topics:
CA ACF2 for z/VM Mode Transition
Sharing CA ACF2 for z/VM Databases
Recovering Databases under Database Sharing
|
Copyright © 2009 CA Technologies.
All rights reserved.
|
|