Security details are kept within your application database. These details are maintained by the Security Module Utility (LSM) and contain usercodes, list names, Ispec names, and Report names.
At runtime, users with insufficient security are denied access to Ispecs, and security violation messages are sent to the user stations.
When you are signed on to your application, security is checked for every access to an Ispec made using a Recall logic command or from the Ispec Selection screen (Page 2). If an Ispec is not valid for your usercode, an Insufficient security message is returned.
Security for an application can be turned on or off using LSM. If the application is already running, the setting is ignored until that application is next started up.