Previous Topic: Recommended Options

Next Topic: Signon Access


Implementing Security

Security is implemented on two levels:

There are also additional security options available, in the form of exits.

Note: Background User IDs must be defined to the security system. If you are using an external security package, you must create these definitions within your security system; if you are using UAMS, the definitions are created automatically.

More information:

Background Environment User IDs