Security checking

The scope of a particular CEDA command can be limited by a combination of several levels of security checking.

The normal transaction-attach security is described in Transaction security . CEDA calls the exec interface programs to process the user’s commands, in much the same way as CECI or a user’s command-level program would. The resource security and the command security used by the command-level programming interface are thus applicable to the master terminal user.

For programming information about command security checking, see Security checking .