Attempt made to access an application program without adequate authority.
Obtain authority from the security officer or program owner, and then try the command again.
(C) Copyright IBM Corporation 1992, 2006. All Rights Reserved.