Implementing Security Exits
This section describes how to implement each type of security exit, and includes information for specific security environments such as, IBM® RACF, CA-ACF2, and CA-TOP SECRET.
Note: User specified program names are limited. For more information,
refer to User Specified Program Limitation Feature.
Note: You must have the High-level Assembler to assemble the sample exits.
CAUTION:
To avoid out-of-storage ABENDS in Connect:Direct® for z/OS®, examine all user exits to
verify that all obtained storage either via GETMAIN or STORAGE OBTAIN is freed. For each
GETMAIN/STORAGE OBTAIN that an exit issues, the exit must also issue a corresponding
FREEMAIN/STORAGE RELEASE to avoid accumulating storage. If an exit opens a file, you may need to
issue a FREEPOOL after the file is closed.