Security exits

You can supply four different exits to control access to resources on ICSF. ICSF calls the security exits at these points:

See Security installation exits for more information about the security exits.