As in a single-system environment, links must be authorized to:
- Attach a transaction
- Access all the resources that the transaction is programmed to use.
This results in security levels called transaction security, resource security, and command
security.