A protected subsystem is an application that, when run, causes
the process running the application to be granted one or more identifiers.
For as long as a user runs the subsystem, the user's process rights
list carries these additional identifiers.
How Protected Subsystems Differ from Normal Access Control shows how a protected subsystem adds a second level
of access control to traditional controls.
Figure 1 How Protected Subsystems Differ from Normal
Access Control
Users with execute access to the application gain access to
the subsystem. Once in the subsystem, users can work with the data
files and other resources of the subsystem.
A subsystem can have several identifiers because the resources
consumed by the subsystem (the files, printers, and so forth) can
be protected differently.
Possession of subsystem identifiers is limited to the period
users are executing the application. Once the users exit from the
application, the identifiers are removed from their process rights
lists. Subsystem identifiers are also removed from the rights list
whenever users enter a Ctrl/Y sequence or attempt to create a subprocess with
the DCL command SPAWN. (In this respect, use of the subsystem identifiers
is identical to the operation of images installed with privileges.)
The following identifiers
are reserved for use in the security subsystem and should not be
granted to any user: