- Duration
- 4 hours
These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
Application programmers, systems programmers, database administrators, security administrators, and other personnel requiring knowledge of the use of CA ACF2™ Security Server on the z/OS platform.
Knowledge of TSO, ISPF, data sets, Job Control Language (JCL), and basic security requirements.
After completing this course, the student will be able to:
- Describe how ACF2 users, data set rules, and resources rules are used
- Identify the interfaces that are used to access ACF2
- Log into ACF2
- Identify and interpret logonid records
- Define their logonid record
ACF2 Introduction
ACF2 Administration Roles
ACF2 Reports
TSO/E and ISPF Interfaces
Batch, Operator, and Programming Interfaces
The Logon Process
The Logonid Record
The LIST ACF2 Command