NC-Access Modernization Guide
NC-Access is a sharing product by Dell Computer Corporation. Explore technical details, modernization strategies, and migration paths below.
Product Overview
NC-Access streamlines access to z/OS mainframe applications through single sign-on (SSO).
It integrates with existing security systems like RACF, ACF2, and Top Secret.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What does NC-Access do?
NC-Access provides single sign-on capabilities for the z/OS mainframe environment. It allows users to authenticate once and access multiple z/OS applications and resources without re-entering credentials. This simplifies access management and improves user experience.
Is this a system, application, or tool?
NC-Access is a security application that provides single sign-on functionality. It is not a system or a toolset, but rather a focused application designed to enhance security and streamline access within the z/OS environment.
What types of organizations use this?
Organizations that rely heavily on the z/OS mainframe for critical business applications and data are the best fit. This includes large enterprises in industries such as banking, finance, insurance, and government. Any organization seeking to improve security and user experience on z/OS can benefit.
When should we consider NC-Access?
A company should consider NC-Access when they need to simplify user access to z/OS applications, improve security by centralizing authentication, and reduce the overhead of managing multiple user IDs and passwords. It is especially useful when integrating mainframe applications with modern web-based systems.
What are the alternatives to NC-Access?
Alternatives to NC-Access include Vanguard ez/Signon, NC-Syncom, and IdentityForge Advanced Adapter. These products offer similar single sign-on capabilities for the z/OS environment, but may differ in features, integration options, and ease of use.
Technical
For mainframe products: Does this run in an LPAR?
NC-Access runs on the z/OS platform and is dependent on the z/OS operating system. It typically runs within an LPAR (Logical Partition) on the mainframe. It may require specific z/OS subsystems to be active for full functionality.
What infrastructure is required?
NC-Access likely integrates with existing security systems such as RACF, ACF2, or Top Secret for user authentication and authorization. It may also integrate with LDAP directories for user management. Specific integration details depend on the configuration.
Does NC-Access have an API?
While specific API details are not available, NC-Access likely exposes APIs for integration with other systems. These APIs could be REST or SOAP-based, allowing external applications to authenticate users or retrieve user information. Consult the vendor documentation for specific API endpoints and methods.
What are some common commands?
The exact commands and syntax for NC-Access are vendor-specific and not publicly available. However, common operations would include user authentication, session management, and access control. Configuration files would likely be used to define user roles, application access, and security policies.
Business Value
What business problem does it solve?
NC-Access solves the business problem of managing user access to z/OS applications in a secure and efficient manner. Without it, organizations face the challenges of managing multiple user IDs and passwords, increasing the risk of security breaches and reducing user productivity.
What is the business value of NC-Access?
The primary business value of NC-Access is improved security and reduced administrative overhead. By centralizing authentication and access control, organizations can reduce the risk of unauthorized access and simplify user management. This leads to cost savings and increased efficiency.
How does NC-Access integrate with enterprise ecosystems?
NC-Access integrates with enterprise ecosystems by providing a single sign-on solution for z/OS applications. This allows users to access mainframe resources seamlessly from other enterprise systems, such as web portals and cloud applications. It improves user experience and simplifies access management across the organization.
Security
What authentication methods are supported?
NC-Access supports various authentication methods, including password-based authentication, multi-factor authentication (MFA), and integration with external identity providers via protocols such as SAML or OAuth. The specific methods supported depend on the configuration and integration with existing security systems.
What access control model is used?
The access control model used by NC-Access is likely Role-Based Access Control (RBAC). This allows administrators to assign users to roles and grant access to resources based on those roles. It simplifies access management and ensures that users only have access to the resources they need.
What encryption is used and where?
NC-Access uses encryption to protect sensitive data, such as user credentials and session tokens. Encryption is used both in transit and at rest to prevent unauthorized access. The specific encryption algorithms used depend on the configuration and security policies.
What audit/logging capabilities exist?
NC-Access provides audit and logging capabilities to track user activity and security events. These logs can be used to monitor for suspicious activity, investigate security incidents, and comply with regulatory requirements. The logs typically include information about user logins, access attempts, and configuration changes.
Operations
How is NC-Access typically deployed?
NC-Access is typically deployed on-premise within the z/OS environment. It requires technical expertise to implement and configure. Ongoing operational requirements include monitoring system performance, managing user accounts, and applying security patches.
What are common implementation challenges?
Implementing NC-Access can be challenging due to the complexity of the z/OS environment and the need to integrate with existing security systems. Common challenges include configuring authentication methods, defining access control policies, and ensuring compatibility with different z/OS applications.
What administrative interfaces are available?
Administrative interfaces for NC-Access likely include a command-line interface (CLI) and potentially a web-based console. The CLI is used for advanced configuration and scripting, while the web console provides a user-friendly interface for managing user accounts and security policies.
Ready to Start Your Migration?
Download our comprehensive migration guide for NC-Access or calculate your ROI.