You need to decide how users will sign on to the system.
Signon allows user who have authority to your system access to these resources. A signon consists of a user name and its associated password. System values control who can sign on, how users can sign on, to which devices users can sign on, and what actions the system takes when a user violates signon rules. Signon system values can be categorized into those system values that set up the signon environment, handle signon for interactive jobs, and limit signon to specified users and devices.
Signon environment
Three system values allow you to create a signon environment for your users. They provide information regarding signon activity and the number of signon attempts a users has before the system takes some action. The following system values provide ways to control the signon environment for users:
Interactive jobs
Interactive jobs require continual two-way communications between the user and the system to perform a task. An interactive job begins when a user signs onto a system and enters a request, and the system responds by processing the request. This pattern is repeated until the user ends the interactive job by signing off the system. These three signon related system values work together to provide security when dealing with interactive jobs:
Limiting signon
In some case you may need to limit who and what has access to your system resources. Users with all-object (*ALLOBJ) and security officer (*SECOFR) authorities may need to be limited to certain workstations and devices. Also workstations that may have physical security concerns, for example; computers that are secluded and could be used by unauthorized user to gain access to your system may also need to be limited.