Note: On

2

security, QALWUSRDMN

is

set to

a system configured forsystemC2

QTEMP

(only the QTEMP library can

contain user-domain

user

objects).

For more information about C2 security, GuiderefertotoEnablingthe C2

Securitybook, SC41-0103.

Related Information

Ÿ “Using Data Queues versus User Queues” on page A-15

ŸCreate User Index (QUSCRTUI), Create User Queue (QUSCRTUQ), an Create User Space (QUSCRTUS) APIs in the ObjectSys empartAPI of the Reference, SC41-5801

ŸChapter 2 ofSecuritythe – Reference, SC41-5302

Exit Programs

Exit programs are called and given control by an application program o program. They can be used to customize particular functions to your

exit program is a program to which control is passed from a calling pr

Exit programs are usually user-written programs; however, a few are s supplied (such as a few of the Operational Assistant exit programs).

To transfer

control

to

an exit program,

you

do an external

call as y

other

program.

 

 

 

 

 

There

are no general requirements for using exit programs. For any sp

requirements,

see

the

documentation for

the

specific exit

program.

Exit Points

An exit point signifies the point in a system function or program where turned over to one or more exit programs to perform a function.

Prior to Version 3 Release 1, the exit program might have been re network attributes, system values, CL command parameters, or attributes objects. Also, in previous releases, all exit point providers had to means of registering and deregistering exit programs.

The registration facility provides a central point to store and retrieve in about OS/400 and non-OS/400 exit points and their associated exit progr information is stored in the registration facility repository and can

determine

which

exit

points and exit

programs

already exist.

You

can

use the

registration

facility

APIs to

register and deregis

add

and

remove

exit

programs, and to retrieve information about exit

exit

programs. You can also perform some of these functions by using

with

Registration

 

Information

(WRKREGINF)

command.

 

2 C2 is a level of security TrusteddefinedComputerin theSystem Evaluation Criteria(TCSEC) published by the United States Government.

Chapter 2. Getting Started with2-27APIs

Page 47
Image 47
IBM Version 4 manual Exit Programs, Exit Points, Security, Qalwusrdmn Set to System configured forsystemC2