Previous Topic: Authorizations for General UsersNext Topic: About Creating Your Rules


Security with the Rules Facility

A rule determines whether the action requested by one requester that affects another user ID is allowed. With each request, a user ID or terminal address (the requester) issues a command to gain access to resources (the target) owned by another user ID.

This section contains the following topics:

About Creating Your Rules

System Rules

Security Group Rules

User Rules

Default Rules

Using a Rules Database to Secure Your Site Resources

Updating Rules Files

Creating Security Groups

Assigning User IDs to Security Groups

Removing User IDs from Security Groups

Making Temporary Security Group Changes

Displaying Rules and Security Group Membership

Recording and Reviewing Access Attempts

Accountability of Group User IDs

Controlling the CP LINK Command

Combining Rules

Controlling CP Commands

Enabling CP LOGON BY When CA VM:Secure is Unavailable

Controlling CA VM:Tape Commands

Controlling CA VM:Schedule Commands

Querying the Rules Database

Additional Security Processing

CA VM:Secure Journal Facility and CP Journaling