Previous Topic: Use an External Security PackageNext Topic: Design Functional Security


Code Security Logic

In environments without a teleprocessing monitor, such as UNIX and Linux, application logic must be coded for transaction security. To build logic for transaction security, the first thing a server must do is validate a user's authorization.

There are two ways an application can validate transaction security:

Note: For information about the TIRSECR exit, see the User Exit Reference Guide.