IISEC (1-byte character string)

Security scope.

This indicates the desired IMS security processing. The following values are defined:

ISSCHK

Check security scope.

An ACEE is built in the control region, but not in the dependent region.

ISSFUL

Full security scope.

A cached ACEE is built in the control region and a non-cached ACEE is built in the dependent region. If you use ISSFUL, ensure that the user ID for which the ACEE is built has access to the resources used in the dependent region.

If neither ISSCHK nor ISSFUL is specified for this field, ISSCHK is assumed.

The initial value of this field is ISSCHK.