The goal of the security exit is to return both an application ID and a user ID to tablesONLINE. Immediately after the security exit processing, the application ID and user ID are used to retrieve controlling information from the Application Control table or TBOLACT. This table is used in system administration, security control, and environment setup for users. Detailed information on the setup of the Application Control table is provided in tablesONLINE/CICS Administration.
Note:
If you have never set up a tablesONLINE/CICS environment before, please see Setting up an organization. You will find an overview of the process and logic required to set up an environment.