The most basic method of controlling system access is to allow only those users with valid usercodes and passwords to log on to your system. The USERDATAFILE contains the defined usercodes, associated passwords, and other user attributes, which determine whether access is allowed for a user. You can configure a usercode to require a second authentication factor during logon.
Additional degrees of access rights to systems and files can be achieved by permitting granular amounts of privilege to particular users. User access privileges depend on the access rights associated with
-
The usercode in the USERDATAFILE
-
The usercode in the Transaction Server
-
The user station (remote terminal)
Some usercode attributes are effective only if your system has the Secure Access Control Module software enabled. The Secure Access Control Module is described later in this overview.

