IBM i Security Authorization Chart



Soure: Robin Tatam, Helpsystems.com and please note that this flowchart is actually an interpretation of the flowchart published by IBM in the security reference manual.

Double click on the image to enlarge.