Verifying end users using conversation-level security

When an application program allocates a conversation to satisfy a request from an end user, it builds an FMH-5 to represent the conversation and then issues an APPCCMD CONTROL=ALLOC macroinstruction. The FMH-5 can contain information about the end user, which VTAM® passes to the partner application program. It is the application program's responsibility to coordinate the usage of this information. VTAM checks the FMH-5 only to verify that the FMH-5 conforms to the architected format.

The conversation-level security related fields in the FMH-5 are:

For a complete description of the format of the FMH-5 and the valid combinations of these fields, see FMH-5 fields.