z/OS TSO/E Programming Services
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Application Routine Versus the unauthorized resource processor

z/OS TSO/E Programming Services
SA32-0973-00

As noted above, access to the unauthorized resource processor is through the TSO/E IKJURPS service and requires two main interfaces within this flow of control:
  • The application interface to the IKJURPS service
  • The unauthorized control layer interface to the unauthorized resource processor.
The following sections provide a detailed view of:
  • The interface between the application program and the IKJURPS service
  • The interface between the TSO/E TMP unauthorized control layer and the unauthorized resource processors
  • How to install unauthorized resource processors.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014