Password Rules and Beyond - Exploring the ESM Password Environment
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings,
SHARE Atlanta 2016,
2016
Mainframe users are tasked with creating good, strong, complex passwords. If a user's ID and password represent the “Keys to the Kingdom”, who and/or what is minding the castle? This presentation dives deep into the password ecosystem of the Enterprise Security Managers (RACF, ACF2 and Top Secret), describing all of the settings surrounding passwords, their management, control and restrictions, while providing a foundation of industry Best Practices for each.-Richard Faulhaber-NewEra Software, Inc.
Back to Proceedings File Library