In addition to the security profile that you set up for the link, you may want to further restrict each remote user's access to the transactions, commands, and resources in your system. This is done by specifying the appropriate ATTACHSEC parameters in the CONNECTION definition. This user security, like link security, distinguishes between transaction, resource, command, and surrogate security. User security can never increase a user's authority above that of the link.
For information on defining user security in your system, see either User security with LU6.2 or User security with MRO, depending on the environment you are using.
You cannot specify user security for LU6.1 links. For LU6.1, the user security is taken to be the same as the link security.