You should consider authorizing access to the following when planning
your security requirements to run CICS®:
- CICS PDS libraries
- Protect your CICS data sets that use RACF®.
See Protecting CICS load module data sets.
- VTAM® ACB
- Authorize each CICS region userid to OPEN the VTAM ACB
for the region’s specified APPLID. See Authorizing access to a CICS region’s VTAM ACB.
- CICS system transactions
- Authorize each CICS region userid to access the CICS category
1 system transactions. See Authorizing the region userid to access category 1 transactions.
- SMSVSAM server
- Authorize each CICS region to open the SMSVSAM control
ACB if you plan to use CICS with VSAM record-level data sharing.
See Authorizing access to an SMSVSAM server.
- System logger log streams
- Authorize each CICS region userid to access the MVS™ system logger
log streams that are used by CICS. See Authorizing access to MVS log streams.
- z/OS® UNIX System Services
- Include an OMVS segment in the CICS region's
user profile, specifying the UID parameter, to ensure that your CICS regions
have the required access to z/OS UNIX system services. See Authorizing CICS region userids to z/OS
UNIX System Services.
- RACF resource classes
- Activate the appropriate RACF resource
classes to enable terminal users to access CICS resources
and user-defined resources. See Activating RACF resource classes.
[[ Contents Previous Page | Next Page Index ]]