Adoptive authority indicates whether or not a program should run under the authority of the user (*USER) or the authority of the owner(*OWNER).
The CRTCICSCBL and CRTCICSC CL commands do not support adoptive authority directly. All programs created with these commands have the *USER authority by default. To run CICS/400 application programs that include, for example, high-security system programming commands, and for which you require high authority, you can create a CL program (using a high-authority user profile) to call the CICS/400 application program, using the CRTCLPGM CL command, with the User profile (USRPRF) parameter set to *OWNER. The CL program runs under the higher-level *OWNER authority, as does the CICS/400 application program that it calls. Because the CL program has not ended, the CICS/400 program is running, in effect, under adoptive security.
IBM - AS/400 Related Interview Questions
|IBM - RPG Interview Questions||IBM - VSAM Interview Questions|
|IBM Cognos Interview Questions||IBM DB2 Interview Questions|
|System Administration Interview Questions||IBM AIX Interview Questions|
|SQL Interview Questions||AS400 Interview Questions|
|IBM BPM Interview Questions||Synopsys Interview Questions|
|Rpgle Interview Questions|
Ibm - As/400 Tutorial
Introducing Cics® For Iseries™
Defining A Basic Control Region
Security Requirements For Cics/400
Defining Your Own Control Region
Administering The Control Region
Administering A Cics/400 Shell
Defining Resources-reference Information
Autoinstall For Terminal Definitions
Introduction To Cics/400-supplied Transactions
Cemt—cics Master Terminal Transaction
All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd
Wisdomjobs.com is one of the best job search sites in India.