Security checking
There is no resource or command security in the CEDA transaction.
Security in CEDA is limited to the initial transaction-attach security and to surrogate security on the install of resources that are defined with a user ID other than the user ID of the user that issues the command.
The ability to restrict user access to some functions of CEDA is provided using the CEDB and CEDC transactions.
For programming information about command security checking, see Security checking.