Previous Topic: Security ModesNext Topic: Resource Level Security


Transaction Level Security

Transaction level security is effective for end‑users only. A programmer can design an application to link to the program behind the transaction and get into the protected application by bypassing the transaction level security. If the files available within the facility are not protected a programmer can modify the program to access the files available behind the transaction level security. Proper program change controls limit these types of exposures.

If you choose to implement transaction level security with LCF, consider the following:

If you choose to secure transactions through OTRAN, consider the following: