Table of Contents
This section introduces the basic concepts of controlling system access. These concepts include
-
Log-on policy
-
Types of system access rights
Basis of System Access Control
System access control is based on user identification, and identification is based on the usercode. A usercode is a string of a maximum of 17 characters that is defined in the USERDATAFILE.
The user access privileges depend on the
-
Access rights associated with the usercode in the USERDATAFILE
-
Access rights associated with the usercode in the Transaction Server
-
Access rights associated with the user's station (remote terminal) in the message control system (MCS) under which the user is running—either Command and Edit (CANDE) or Transaction Server
Only the access rights associated with the user station are independent of the usercode.
When the user enters a usercode during log-on
-
An identity, or session, is established with the system.
-
During the session
-
The user has the access rights associated with that usercode.
-
Files that are created during the session are stored under the usercode.
-
Programs that are run are given the usercode as the value of their USERCODE task attribute.
-

