AUTHORIZE provides the manager with several ways to manage user access to the system.
AUTHORIZE supports a database, called RIGHTSLIST.DAT, to group users in categories to ease management tasks.
Users are also grouped by user identification code (UIC).
Access control lists (ACLs) and UICs provide mechanisms to protect files, queues, devices, and other system resources from unauthorized access. SET PROTECTION is the primary command to assign protection levels to resources.
Users can determine how the manager has set the various flags with SHOW PROCESS/ALL.
SHOW INTRUSION is a DCL command to display the contents of the login intrusion (break-in) database. After ACL and UIC, system privileges act as an additional filter to determine certain resource protection, notably system-level management commands.
DELETE/INTRUSION is a DCL command used to remove an entry from the intrusion database.