Transaction, resource, and command security with MRO

As in a single-system environment, users must be authorized to:
  • Attach a transaction.
  • Access all the resources that the transaction is programmed to use. This results in security levels called transaction security, resource security, and command security.