IBM Version 4 Universal Remote User Manual


 
Note: On a system configured for C2
2
system security, QALWUSRDMN is set to
QTEMP (only the QTEMP library can contain user-domain user objects).
For more information about C2 security, refer to the
Guide to Enabling C2
Security
book, SC41-0103.
Related Information
“Using Data Queues versus User Queues” on page A-15
Create User Index (QUSCRTUI), Create User Queue (QUSCRTUQ), and
Create User Space (QUSCRTUS) APIs in the Object part of the
System API
Reference
, SC41-5801
Chapter 2 of the
Security – Reference
, SC41-5302
Exit Programs
Exit programs are called and given control by an application program or system
program. They can be used to customize particular functions to your needs. An
exit program is a program to which control is passed from a calling program.
Exit programs are usually user-written programs; however, a few are system-
supplied (such as a few of the Operational Assistant exit programs).
To transfer control to an exit program, you do an external call as you would to any
other program.
There are no general requirements for using exit programs. For any specific
requirements, see the documentation for the specific exit program.
Exit Points
An exit point signifies the point in a system function or program where control is
turned over to one or more exit programs to perform a function.
Prior to Version 3 Release 1, the exit program might have been represented as
network attributes, system values, CL command parameters, or attributes of system
objects. Also, in previous releases, all exit point providers had to supply their own
means of registering and deregistering exit programs.
The registration facility provides a central point to store and retrieve information
about OS/400 and non-OS/400 exit points and their associated exit programs. This
information is stored in the registration facility repository and can be retrieved to
determine which exit points and exit programs already exist.
You can use the registration facility APIs to register and deregister exit points, to
add and remove exit programs, and to retrieve information about exit points and
exit programs. You can also perform some of these functions by using the Work
with Registration Information (WRKREGINF) command.
2
C2 is a level of security defined in the
Trusted Computer System Evaluation Criteria
(TCSEC) published by the United States
Government.
Chapter 2. Getting Started with APIs
2-27