Previous Topic: Utility ProgramsNext Topic: JCL Considerations


Securing Utility Commands

Individual utility commands can be secured whether they run in batch or online. See the CA IDMS Security Administration Guide for details.