Security Management Guide (G06.24+, H06.03+)
Concerns for the Application Programmer
Security Management Guide—522283-008
6-5
Application-Specific User IDs
Using the Name Database to Authenticate a User
At the beginning of your application, include algorithms to authenticate the user. For 
example, you might display a query screen that asks for the user’s name (as known to 
the application) and then a password. Ensure that the only way to reach any other 
portion of the program is to successfully complete this screen.
If you have many applications that either share the same user-name database or 
similar user-name databases, develop and test a standard logon screen. The 
advantages of a standard logon screen: 
•
You do not have to start over every time you add an application. 
•
Your user community quickly becomes accustomed to a standard way to log on to 
the applications.
Using the Name Database to Authorize a User’s Actions
After your application has authenticated the user, your application might need to 
restrict the actions of the user based on the user’s identity.
You can restrict actions by providing categories of users, similar to the Guardian super 
group’s (255,*) inherent authorizations.
Or you can have your application’s name database contain information for each user 
about the operations that the user can perform. For example, if your application has 10 
screens, you might include a 10-character string in your name database made up of 
the characters W, R, and N, meaning Write (and read), Read, and None, respectively. 
Each character represents the level of access allowed to the corresponding screen. 
For each screen selected by the user, the application program consults the 
corresponding position in the string to determine the level of access allowed. You also 
need to provide maintenance operations to update these authorization strings.










