Previous Topic

Next Topic

Book Contents

Book Index

Recipient Tree and Security

The Recipient Tree can be used as a security mechanism for filtering the reports listed in User Report lists (screen U). When an online user enters a User Report list, only those reports which the user is authorized to access, as defined in the Recipient Tree, are listed.

Online users (for example, TSO, CICS, VTAM and IMS users) can be authorized to access the reports of a recipient by specifying their ID or prefix in the AUTHORIZE field of the Recipient Definition screen. This AUTHORIZE field is used by security module CTDSE04 and user Exit CTDX004 to filter the list of reports. For more information about the AUTHORIZE field of the Recipient Definition screen, see Recipient Definition Screen. For more information about user Exit CTDX004, see the Exits chapter in the INCONTROL for z/OS Administrator Guide.

Parent Topic

Defining the Recipient Tree