Previous Topic: Resource Access Incorrectly AllowedNext Topic: STEP 2


STEP 1

Determine the user’s and facility’s mode.

Enter:

TSS LIST(acid) DATA(XAUTH,PROF)
     TSS MODIFY(FAC(facility))

Does the user or attached profile have a less restrictive mode than the facility?

Example: User is permitted to DORM mode but the facility is in IMPL mode.