O'Reilly logo

Complete CL: The Definitive Control Language Programming Guide, Fourth Edition by Ron Hawkins, Doug Pence, Ted Holt, Kevin Forsythe, Ernie Malaga

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14. Security Considerations

No book about CL would be complete without some discussion of system security concepts. CL programmers must be aware of security issues to keep a secure system. Most of the security considerations discussed in this chapter are applicable only to systems that have a security level of 30 or higher. If your system is at security level 20 or 10, refer to the section that discusses the command line.

Securing the *Pgm Object

i5/OS provides a comprehensive security system that allows you to secure objects so that only some users (whom you specify) can perform certain functions (which you also specify). For example, you can indicate that user JANE will be allowed to read the employee master file, but not change it in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required