Previous Topic: Signon Exit ProgramNext Topic: Establishing the Signon Transaction (SC00INIT and SC00TRAN)


Signon Processing Execution Flow

The signon process controls the first level of security. During signon, either CA Ideal or an external security system checks to make sure that the user is authorized to access CA Ideal. In general, the CA Ideal signon process works as follows:

  1. You sign on to the teleprocessing monitor system. If a security system is used, the teleprocessing monitor system passes control to the security system, which determines whether you are allowed to sign on. It then returns your security ID to the teleprocessing monitor system.
  2. You sign on to CA Ideal. The signon command or transaction you enter invokes an initialization procedure, which:

You can use a default user definition when the user's signon-id is not found in the dictionary.

When you use an external security package to control access to CA Ideal, the security ID identifies the user instead of an operator ID or a terminal ID. There are differences in the parameter values in the SC00TRAN and IDOPTS tables, the site options have different settings, and the security ID finds the user definition in the dictionary.