Implementing CICSPlex SM security

This topic explains how to implement RACF® security for CICSPlex® SM. The first section provides general information to help you determine who needs access to the various CICSPlex SM functions. The remaining sections provide detailed information on defining CICSPlex SM class names, using resource names, activating security, and refreshing RACF profiles.

Note: For information on using a SAF-compliant external security manager (ESM) other than RACF, refer to Invoking a user-supplied external security manager.
  1. Decide who needs access to CICSPlex SM.
  2. Review the general security requirements for CICSPlex SM.
  3. Create RACF profiles for the CICSPlex SM data sets.
  4. Define the CICSPlex SM started tasks to RACF.
  5. If CICS® transaction security is active in a CMAS, define the CICSPlex SM transactions to RACF.
  6. If CICS transaction security is active in a MAS, define the CICSPlex SM transactions to RACF.
  7. Create RACF profiles for the CAS functions and PlexManager views.
  8. Create RACF profiles for the CICSPlex SM views.
  9. Create RACF profiles for the CICSPlex SM Web User Interface resources. See the CICSPlex System Manager Web User Interface Guide for more information.
  10. If desired, activate simulated security checking using the CICSSYS, CPLEXDEF, or MAS views
  11. Activate security in the CMASs and MASs using the CICSPlex SM and CICS security-related system initialization parameters