

Viewing Security Object Data in the Investigator › Security Definitions › Rules
Rules
The Rules category lets you view access, resource rules, and rule lines that are associated with data sets. You can also view resources such as TSO accounts, procedures, commands, facilities, and IMS transactions. The CA Chorus for Security and Compliance Management supports rules and rule lines for CA ACF2 and CA Top Secret.
- CA ACF2 supports rules. Access rules describe the conditions for accessing particular data sets and determine whether access is permitted or prevented for a user or group of users. Resource rules describe conditions for accessing particular resources including TSO accounts, TSO procedures, IMS transactions, commands, and other resources.
- CA Top Secret supports permissions, which give users access to defined resources. Permissions make an owned resource available to other users in a controlled manner. Permissions are by the following:
- Facility
- Day and time
- SYSID
- Access level
After you select a row of data, more granular information appears in the Details pane at the bottom of the Investigator.
Example: Identify the scope of a change to the CA ACF2 rule
You have received a request to modify a rule. You recognize that this rule can be widely used, but you want to confirm. Doing so lets you determine the impact and decide the best time to implement the change.
- Add the Investigator module to your dashboard, and click Start New Investigation.
- Select Security from the drop-down list.
- Select Definitions, Rules from the folder list.
- Click View Filter (magnifying glass icon).
- Filter the data to locate the rule to be changed.
- Select the rule-line in the table, and select Show All Users from the Action pane.
The results indicate that this rule is widely used. Based on this information, you plan to suggest to your manager that you implement this change during off hours.
Copyright © 2013 CA Technologies.
All rights reserved.
 
|
|