Using administrative security

This section describes how to configure access management when not using Central Governance.

The proprietary security system is implemented in two stages:

  • Defining the security command parameter settings
  • Generating user privileges

If the parameter settings are modified without being regenerated, warning messages are displayed by the application software to inform users that the security internal datafile may be inconsistent.

Tools

The SECUTIL batch utility is available for creating privileges. SECUTIL compiles a sequential or text file previously created using a text editor (SECUTIL #filename).

Related Links