Computer operations whose execution would increase usage costs may require
use of authorization and notification plug-ins to prevent unauthorized
execution. The command may be designed to only execute properly if the
authorization and notification plug-ins are properly registered. The
computer system customer designs the authorization and notification
plug-ins based on standard application programming interfaces to suit the
customer's business practices and links them to the computer operation.
The computer operation executes the authorization plug-in to determine if
the proper authorization plug-in parameters have been specified and
verify that the command is authorized. If authorization is granted, the
computer operation checks to see that the notification plug-in is given
the correct parameters, executes the computer operation, and then
executes the notification module to notify the necessary personnel. Both
authorization and notification plug-ins return errors that are passed to
the user through the computer operation.