Security management

Top  Previous  Next

Very often, in an OLTP system, not all the users are entitled to execute all the defined operations. The system administrators may desire that only a certain group of authenticated users could be allowed to use a specific set of resource.

I.e. the administrators wants to the invoice department users to execute only invoicing transactions, and marketing department users to execute only CRM transactions.

XCICS/TS security system is based on the concepts of transaction protection level and users.

The transaction protection level is numeric identifier, varying from 1 to 64, associated with a transaction identifier (PCT entry). More transactions may share the same protection level.

The user is the identifier of the operator connected to the system. Each user has an one authorization set that allows him to execute those transactions with a compatible protection level.