Previous Topic: 10. MODIFICATION

Next Topic: 10.1.1 Available User Exits

10.1 Standard User Exits


A number of user exit points are defined within CA MICS. Each
of these points corresponds to a position in the CA MICS
logic where user modification:

o  Is likely to occur, based on our experience

o  Is unlikely to compromise CA MICS database and
   operational integrity

o  Is relatively easy to document and understand

Using the CA MICS exit facilities to modify CA MICS logic is
the safest method of system modification.  If you follow the
material in this section, you can perform a substantial
amount of system customization without causing any undue
ramifications when you apply standard vendor maintenance to
the product.

Before implementing an exit, the system administrator should
determine whether the required modification can be
accomplished by means of parameter modification or file
tailoring.  If an exit must be used, be sure to see Chapter 9
of this guide for details on where the exit is called during
the DAILY processing.  Full details of CA MICS exit
processing are described in the System Modification
Guide, Section 4.3, User Exit Facilities.

The following sections identify the user exits available for
the Hardware and SCP Analyzer processing, provide a general
overview of the product's processing logic, and describe in
detail each of the user exits.

    1 - Available User Exits
    2 - General Exits
    3 - Output Exits