A trigger program is nothing more than a standard IBM i/OS *PGM object. When it is associated with a *FILE, the OS will call the program according to the instructions you provide with the trigger file registration.
Depending on the size of your shop and the number of users, there could be hundreds or even thousands of security decisions being made by your security setup on a minute by minute, hour by hour, day by day basis. If you've done your homework well, those security arrangements will all work to protect your data from being used incorrectly.
RECENT POSTS
CATEGORIES