Security is implemented on two levels:
There are also additional security options available, in the form of exits.
Note: Background User IDs must be defined to the security system. If you are using an external security package, you must create these definitions within your security system; if you are using UAMS, the definitions are created automatically.
| Copyright © 2012 CA. All rights reserved. |
|