Previous Topic

Next Topic

Book Contents

Book Index

Access to the IOA Online Facility

Whenever a user attempts to access the IOA Online facility, the user’s authority is checked. This authorization check is performed for all environments in which the user attempts to access IOA, including TSO, Online monitor, CICS, ROSCOE, and so on.

The authorization check verifies that the logged on user has at least read access to a given entity associated with IOA access ($$IOAONLINE.qname), as defined in your security product.

Authorization is also checked when the IOA Online facility is accessed in batch using the IOA KeyStroke Language (KSL).

The IOASE06 IOA Security module verifies the user’s authority to use the IOA Online facility.

For details of the entity names to be defined to your security product, see Basic Definition Security Calls and Extended Definition Security Calls.

Parent Topic

Protecting IOA Elements