Previous Topic: Security PreauthorizationNext Topic: Restricting Users Through Preauthorization


Introduction

The next five areas of concern are all addressed by the use of preauthorizations. They are:

This chapter provides a step-by-step approach to assigning preauthorization for each of the objectives stated above.

You can do this through the Online facility or Batch facility. In Batch, you would use the ADD, MODIFY, and DELETE PREAUTHORIZATION commands. Refer to the CA Endevor/DB for CA IDMS Batch Reference Guide for more information on Batch. In Online, you would select option 2 from the Main Function Menu.