Previous Topic: Benefits of POINext Topic: Specify a Subsystem ID on a POI Command Processor


Security Considerations for POI

The POI controls many areas of system operation, so you might want to restrict who can use it and what those users can do. You can maintain security for POI in any of these ways:

Note: Security rules execute for all POI commands that are issued from an unsecured environment (for example, the TSO address space of a user).