This chapter describes how to implement the various security exits that can be used to provide additional security for your systems.
Your product provides some special-purpose exits that you can use to perform security checks. The following exits are supported:
This chapter describes the functionality and implementation of each of these exits.
|
This section contains the following topics: Implementing Security for File Access Implementing INMC Link Security |