This course will teach you how to use CA ACF2 Security to identify and control access to sensitive data, including z/OS operating system files. You will gain hands-on experience with system entry validation for online, batch jobs and started task control (STC) Logon IDs. In addition, you will be taught how to configure Global System Options (GSO) and discuss their effects on global users and the system. You will also be taught other advanced techniques and concepts, such as redefining a more effective user identification (UID) string, employing decentralized security administration techniques, solving bypass label processing exposures, setting PDS member level security, and defining a MUSASS system and reporting options.
3 Days/Lecture & Lab