All NCL processing that occurs within a system is performed on behalf of product users. These users can be people, who log on to the system with a user ID/password combination. Also, there are internal environments that act like real users, except that they do not have any real terminal associated with them. These internal environments all have virtual user IDs and in fact can be profiled in the same way as a real user ID by having a UAMS definition created.
The most common virtual user IDs are those associated with the background environments known as the background logger and background monitor. If you issue a SHOW USERS command from an OCS window, you will see these virtual user IDs listed along with any real users logged onto the system at the time. Other optional product components generate their own background environments, so the list that you see on a SHOW USERS display varies according to the configuration of the system.
Regardless of whether a user is real or virtual, every user in a product region is capable of executing NCL processes, because every user has an NCL processing region associated with their user ID while they are logged on.
The NCL processing region provides all the internal services necessary to allow the user to have NCL processes executed on their behalf. While there is one NCL processing region for each user; within each user region there can be one or more NCL processing environments.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |