This section describes each of the components of resource security and how they work together to protect information about your system. It also explains how to use CL commands and displays to set up resource security on your system.
Resource security defines which users are allowed to use objects on the system and what operations they are allowed to perform on those objects.
Designing security discusses techniques for designing resource security, including how it affects both application design and system performance.
The topic How the system checks authority provides detailed flowcharts and notes about how the system checks authority. You might find it useful to consult this information as you read the explanations that follow.