ACF2


Also found in: Wikipedia.
AcronymDefinition
ACF2Access Control Facility 2
References in periodicals archive ?
"Honestly the truth was that I got put on probation while I was in English, I didn't meet the probation so they basically dismissed me, so my only choice was to pick a major that would accept my GPR as-is or drop out of [school]," ACF2 said.
I felt so welcomed in that first meeting with her that I was glad that I got kicked out of the English department," ACF2 said.
This approach was a godsend because we already knew the ins and outs of ACF2.
ACF2 //SYSIN DD DATA,DLM='__' JES2 JOB STATISTICS 4,063 CARDS READ 0 SYSOUT PRINT RECORDS 0 SYSOUT PUNCH RECORDS 0 SYSOUT SPOOL KBYTES 0.00 MINUTES EXECUTION TIME
Protect with Robust Mainframe Security: RACF[R], ACF2 and Top Secret[R]
For example, excellent programs such as RACF, ACF2, and TOP SECRET have been developed for IBM systems to control access to specific applications (privileges) and to generate audit trails.
Railroad Retirement Board (RRB), an independent agency in the executive branch of the Federal Government, selected Vanguard's professional services team to provide migration services for its transition from the Computer Associates ACF2 security system to IBM z/OS Security Server (RACFA[R]).
There are a number of other access control products from CA, such as TopSecret and ACF2. Kurt Ziegler, senior vice president of CA's security business, told ComputerWire that all the products "would work together."
After all, it is difficult to gain access to a host that has a security package like RACF, TopSecret, or ACF2. In fact, a recent Coopers & Lybrand seminar held in Minneapolis turned up only one such attack on a host system after a three-year study - and that program was detected and defused before it caused any serious damage.
SFM 2.0 further addresses FTP security shortcomings by integrating the z/OS FTP server with mainframe System Authorization Facility (SAF) security (RACF, ACF2, or Top Secret).
* Support for RACF, ACF2 and Top Secret authentication
A full range of security features allow seamless use of existing security infrastructures including support of commercial security managers such as RACF, ACF2, and Top Secret.