About 10,500 results
Open links in new tab
  1. ACF2 - Wikipedia

    ACF2 was developed in response to IBM's RACF product (developed in 1976), which was IBM's answer to the 1974 SHARE Security and Data Management project's requirement whitepaper. ACF2's …

  2. ACF2for z/OS 16.0 - Broadcom

    Learn how to get started using the ACF2 to manage and identities of users, devices, and applications accessing resources.

  3. Mainframe Access Control - ACF2, RACF Security for z/OS

    Mainframe access control is important; Top Secret, ACF2 or RACF security for z/OS is a great start, but more is needed. Learn why here and supplement your organization’s protection.

  4. RACF vs. ACF2: Key Differences and Choosing the Right Option

    Jul 8, 2024 · ACF2 is similar to RACF in that is also intended for the protection of mainframe resources in terms of access, but it is a different system with different functions.

  5. IBM z/OS ACF2 Security Technical Implementation Guide

    Jun 24, 2025 · ACF2 must use NIST FIPS-validated cryptography to protect passwords in the security database.

  6. ACF2 Administration Guide - IBM

    These commands write the displayed tables to the standard ISPF LIST data set; you can print the ISPF LIST data set from any ISPF panel by issuing the LIST primary command.

  7. ACF2 - grokipedia.com

    ACF2 (Access Control Facility 2) is a commercial discretionary access control software security system designed for IBM mainframe operating systems, including z/OS, z/VSE, and z/VM.

  8. The ACF Command - Broadcom

    ACF commands let you create and maintain the major components of ACF2 . The ACF command setting determines what type of ACF2

  9. Getting started for ACF2 - IBM

    The getting started topics for ACF2 are intended for security administrators and mainframe system programmers to learn the basics of using IBM® Security zSecure™ Audit for ACF2.

  10. The ACF2TM for z/OS and Db2 (ACF2) solution secures and manages mainframe human and non-human identities, along with the underlying policies and processes that govern how those identities …