Broadcom - Interskill Learning Mainframe Training

[email protected]

The Online Mainframe Training Specialists
Search   Course Catalog  
Return to Catalog Home     Return to Curriculum Listing

CA-ACF2® - Protecting System Access

Duration

5 hours

Overview

These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.

Audience

Application programmers, systems programmers, database administrators, security administrators, and other personnel requiring knowledge about the use of the CA ACF2™ Security Server (ACF2) on the z/OS platform.

Prerequisites

Completion of the CA-ACF2 Introduction course and knowledge of the use of TSO, ISPF, data sets, and basic security issues

Objectives

    After completing this course, the student will be able to:
  • Describe the structure of a logonid record
  • Define logonid records used to protect system access
  • Identify and define special and privileged users
  • Enter ACF2 operator commands to modify logonid definitions

Course Content

CA-ACF2 Logonid Database Record Fields

The Logonid Database
Logonid Database Record Fields

Defining Users to CA-ACF2

Inserting Logonids
Changing Password Fields
Deleting Logonids

Changing Logonid Definitions

The Change Command
ACF2 ISPF Panels

Defining Special and Privileged Logonids

Special Maintenance Privileges
Special Batch Privileges
Special Access Privileges

CA-ACF2 - Protecting System Access Mastery Test


Search our catalog