Difference between revisions of "BPCS Naming Conventions"
From MidrangeWiki
(starting another area) |
(→BPCS Security) |
||
Line 8: | Line 8: | ||
For reasons of Security, this is just a synopsis of key [[FAQ]]. | For reasons of Security, this is just a synopsis of key [[FAQ]]. | ||
+ | |||
+ | === BPCS Security at Version 4.0.5.CD === | ||
+ | |||
+ | What people can access and run is controlled by several elements: | ||
+ | * their 400 user profile; | ||
+ | * their BPCS user security; | ||
+ | * are they on the list for some menu we added? |
Revision as of 07:15, 26 May 2005
As explained in some CLP/400 examples of CLP/400 programs, software for BPCS needs to be named in such a way that it is going to work within BPCS Security, which has some variations by version.
BPCS Naming Conventions
BPCS Security
For reasons of Security, this is just a synopsis of key FAQ.
BPCS Security at Version 4.0.5.CD
What people can access and run is controlled by several elements:
- their 400 user profile;
- their BPCS user security;
- are they on the list for some menu we added?