As in a single-system environment, users must be authorized to:
- Attach a transaction.
- Access all the resources that the transaction is programmed to use. This
results in security levels called transaction security, resource security,
and command security.