CA-ACF2 Overview
Short course
In High Wycombe
Description
-
Type
Short course
-
Location
High wycombe
-
Duration
1 Day
On successful completion of this course, attendees will be able to: recognise all of the major CA-ACF/2 components, describe how a well structured CA-ACF/2 database should be set up, begin to administer a CA-ACF/2 system.. Suitable for: The course is suitable for anyone wishing to gain a basic understanding of CA-ACF/2 security concepts.
Facilities
Location
Start date
Start date
About this course
Familiarity with the mainframe (IBM z/Series) server environment.
Reviews
Course programme
On successful completion of this course, attendees will be able to:
- recognise all of the major CA-ACF/2 components
- describe how a well structured CA-ACF/2 database should be set up
- begin to administer a CA-ACF/2 system.
The course is suitable for anyone wishing to gain a basic understanding of CA-ACF/2 security concepts.
Prerequisites
Familiarity with the mainframe (IBM z/Series) server environment.
Duration
1 day
Course Code
ACFO
Contents
Introduction
The need for security; general threats; tightening security; security policy: naming standards; security administration; auditing.
Security features
User identification; resource types; types of access permission; ownership.
CA-ACF/2 architecture
Introduction; databases, Logonids, Resource rules, UID Strings: MVS implementation; system interfaces; messages.
CA-ACF/2 resources
Dataset Rules, Resource Rules, Logonids (Inserting, Changing & Listing).
Access authorisation
UID Strings, Nextkey Processing, Compile & De-compiling rules; how CA-ACF/2 checks authorisation.
CA-ACF/2 system options
GSO records.
Question & answer session
CA-ACF2 Overview