Security scope.
This indicates the desired IMS security processing. The following values are defined:
An ACEE is built in the control region, but not in the dependent region.
A cached ACEE is built in the control region and a non-cached ACEE is built in the dependent region. If you use ISSFUL, you must ensure that the user ID for which the ACEE is built has access to the resources used in the dependent region.
If neither ISSCHK nor ISSFUL is specified for this field, ISSCHK is assumed.
The initial value of this field is ISSCHK.
Notices |
Downloads |
Library |
Support |
Feedback
![]() ![]() |
js50871 |