E-SRF: Access Analysis
Reports on who has access to your resources
Informs you as to what could be accessed based on your security system's definitions.
Analyzes and reports on access controls as they are defined and used
E-SRF Access Analysis reports are produced individually for a specific established security environment.
These reports provide a method to report on who has access to what resources at the user level and at the resource level.
This information may be reported individually or logically grouped together.
Managers may use these reports to determine what critical business information their employees are able to view and modify.
Reports meet Audit standards as they are non-modifiable and one-way encrypted.
Summary and Detailed Report Formats
The summary format presents a list of users with access to a dataset or resource with type of access marked.
Detail format shows the specific environment under which access is granted.
If special criteria or restrictions are included in access rights, they can be viewed on the detail report format.
OpenEdition Resources Reports
Access Analysis reports are available to identify "Who has access?" to OpenEdition Resources in the IBM-RACF* environment.
They show the type of access and the reason the UserID received those access rights.
e-Trust CA-ACF2 (CA-ACF2)* Change Control
The Proposed Rule Processor report compares existing security rules with proposed changes
to quickly identify the effect a rule change would have.
Database and System Differences reports compare data across security databases.
These types of reports are extremely valuable when evaluating multiple systems to determine
who or what is different on each system.
More Information about E-SRF
E-SRF Product Information
E-SRF Event Reporting Module
E-SRF Version 2.3.2 Product Announcement (PDF)
E-SRF Brochure (PDF)
E-SRF General Information Guide (PDF)
E-SRF Version 2.3.2 Release Guide (PDF)
PTFs, Product Support Status, and Compatibility Information
For more information on E-SRF, e-mail our Sales Department at: