CA-ACF2 Basic Administration
5 Days


This course provides the student with a solid foundation of how to implement and administer the CA-ACF2 enterprise security product. The class begins with a high-level view of how all components of the IBM operating system, application software and the CA-ACF2 program interact. Students participate in workshop exercises that provide practical exercises of how to build new logonid records, establish dataset rules, define resource rules, and manage global options of the ACF2 security system. If the course is presented at the client site and access to the ACF2 system is provided by the client, the material may be presented with interactive sessions. Students will then be able to actually insert and delete records and view displays as they are discussed in class. At the end of the five days of training, the student will understand all that is required to work effectively as a security administrator in an ACF2 environment.

AUDIENCE

The course is primarily designed for those who will administer the logonids and rules of an ACF2 system. Although a good deal of information contained in this training would be helpful to those technicians who install ACF2, the course does focus on the details necessary to manage the security product once it has already been installed.

SESSION CONTENT

DAY 1
Session One: Overview of Host-Based Security Systems
  • Data Security
  • CA-ACF2 Design Philosophy
  • CA-ACF2 & OS/MVS, z/OS Operating Systems
  • CA-ACF2 Commands and Utilities
    • System Options
      • ACFFDR
      • @CFDE Macros
      • Defaults (modes,etc.)
Session Two: Identifying System Users
  • The Logonid Database
  • The Logonid Record
  • Special User Logonids (STCs, MUSASS, MAINTs)
  • Commands and Reports
  • Workshop on Building LIDs
DAY 2
Session Three: The User Identification String
  • ACFFDR
  • Creation and Design of the UID
  • Customizing New Fields
Session Four: Writing Access Rules
  • Access Rules Database
  • Access Rule Sets
  • Rule Sets for Special Datasets
  • Commands and Reports
    • Access Rule Maintenance
      • Native TSO mode
      • Vendor Supplied Panels
      • CICS Interface (ACFM)
DAY 3
Session Five: Protecting System Resources
  • Resource Rules
  • Types of Resources
  • TSO Resources
  • CICS Resources
  • Commands
  • Reports
  • Workshop
Session Six: Maintaining Information Storage Database
  • Entry Lists
  • XREF Records
  • Shift Records
  • Scope Lists
  • Reports
  • Workshop
DAY 4
Session Seven: System Options
  • The ACFFDR
  • Global System Option Records
  • Commands, Macros
  • Panels
  • Reports
  • Workshop
DAY 5
Session Eight: Commands & Utilities
  • CA-ACF2 Subcommands
  • ACF2 Console Commands
  • Job Submission Utilities
  • ACFRECVR - file recovery
  • ACFRPTPP - pre-processor
  • ACFRPTNV - environment report
Session Nine: Technical Survey
  • Installing CA-ACF2
    • CA-Activator vs. SMP/E which to use
    • CA-ACF2 JES Initialization
    • CA-ACF2 Job Processing
    • CA-ACF2 SVC Processing
  • Developing a CA-ACF2 Interface
  • Advanced Topics Overview
    • CA-ACF2 SAF Interface
    • Distributed Databases
    • Cacheing with CA-ACF2 (also Sysplex cache)
    • CA-ACF2 Optional Notes (i.e.Password History)
Session Ten: Investigative Study (Optional)
  • Reports
  • Examine System Parameters
  • Selected Logonid Lists (Security, NON-CNCL, etc.)
  • Locating Unused Logonids
  • Tracking Excessive Sec-Vios
  • Invalid Password/Authority Log
  • Cross-referencing
  • CA-EARL Reporting
  • Program Acceptance Procedure
  • MVS Operating System - Areas of Concern

WORKSTATIONS ARE NEEDED FOR THIS SESSION.


 LINUX UNIX z/OS ON-SITE TRAINING  | IT SERVICES  | CONTACT US  | ISPF JCL REXX BOOKSTORE  | HOME

Copyright 2012 MVS TRAINING, INC. All rights reserved
All trademarks & Copyrights are property of their respective manufacturers.