The following table shows the name/token callable services your program can use to manipulate different levels of name/token pairs:
Service | Unauthorized Programs | Authorized Programs |
---|---|---|
Create (IEANTCR) |
|
|
Retrieve (IEANTRT) | Any name/token level | Any name/token level |
Delete (IEANTDL) |
|
Any name/token level |