If your organisation
has already set up security roles for use with other applications, you may
want to reuse an existing role. If so, supply the name of the role that you
want to use in the field provided. If you don't have an existing security
role that you want to reuse, enter a new role name, such as “All_users”. You
can also provide an optional description of the role to act as a memory aid
in the future. Select
Finish to return to the main window.
Note: If
you reuse an existing security role which is already defined to your ESM,
you must remove the Display Name element from the JAR file's
deployment descriptor. This element is used by CICS to provide an application
name which is prefixed to all security role names when performing a security
check at runtime, thus providing support for security roles scoped at the
application level rather than enterprise-wide. In ATK, you can remove this
element by selecting the Overview tab at the bottom of the pane. Select
the text in the Display Name field and delete it.