This video describes aspects of application-based security, such as security rules and how applications can access RACF via an AUTH call to IMS. This video also describes exits for tasks such as sign on/off verification, transaction authorization, and command authorization.