When the system accesses an object that you refer to, it checks to determine if you are authorized to use the object and to use it in the way you are requesting.
Generally, you must be authorized at two levels:
Object authority is controlled by the system's security functions, which include the following:
Special considerations apply when writing a program that must be secure (for example, a program that adopts the security officer's user profile).
(C) Copyright IBM Corporation 1992, 2006. All Rights Reserved.