Previous Topic: Limit Protection to Critical TerminalsNext Topic: Terminal Locking


Source

Source control allows you to restrict users to specific terminals. You may not be required to restrict most of your users to specific sources of entry. There may be a critical subset of your users for which this control may be appropriate, such as production schedulers or end-users using sensitive applications.

The same considerations given to terminal protection must be given to source control because you are defining the port as the source of entry. Again, it is critical to coordinate network reconfigurations between the network control area and the security administration area or unsuspecting users may come in to work one day only to find that they can no longer sign on to their terminals.

Source control, like terminal control, must be used selectively, to avoid large maintenance problems.

Note: The terminal ID of AUTOLOG restricts the use of a virtual machine in two ways: first, with a SOURCE(AUTOLOG) the ACID must be autologged; and secondly, it may not go through the usual procedure for signon. Ownership of terminal AUTOLOG does not allow the ACID to be autologged unless permitted to TERMINAL(AUTOLOG).