This section discusses the security definitions for REXX/CICS such as: general users, authorized users, authorized commands, authorized exec, and system libraries.