For all resource security checking, CICS® needs a userid in order to check the
user's authority to access the resource. CICS can protect resources against
unauthorized use if those resources are used in transactions that are not
associated with a terminal. In addition to transactions started by an EXEC
CICS START command without a terminal identifier specified, there are two
other types:
- Transactions started without a terminal when the trigger level is reached
for an intrapartition transient data queue
- Programs executed from the second phase of the program list table (PLT)
during CICS startup