Previous Topic: CA IDMS as a Batch JobNext Topic: Logging Options


Modes of Operation

The following table provides a summary of access operation by mode for use in predicting system action:

Function

Mode
DORM

Mode
WARN

Mode
IMPL

Mode
FAIL

Signon Processing Required

 

X

X

X

Full Password Controls

 

2

2

X

Task Security Active

 

3

X

X

Program Protection Active*

 

3

X

X

Subschema Protection Active

 

3

X

X

Area Protection Active

 

3

X

X

#SRTT Defined Resource Protection

 

3

X

X

Terminal Protection Active

 

3

X

X

TSS Command Available

X

X

X

X

Application Interface Available

X

X

X

X

Logging Available

 

X

X

X

Auditing Available

 

X

X

X

X

All users in all conditions.

1

If explicit signon is performed.

2

For defined users only.

3

Messages and logging only.

Note the following: