CICS® can now protect, against unauthorized use, resources used in transactions that are not associated with a terminal. These transactions are of three types:
Also, resource security checking can now be carried out for PLT programs that are run during CICS shutdown. PLT shutdown programs execute as part of the transaction that requests the shutdown, and therefore run under the authorization of the user issuing the shutdown command.
The START command handles security for non-terminal transactions started by the START command.
A surrogate user who is authorized to attach a transaction for another user, or cause it to be attached, or who inherits all the resource access authorizations for that transaction, can act for the user.
CICS can issue up to three surrogate user security checks on a single START command, depending on the circumstances:
A separate surrogate user security check is done for each of these userids, as required, before the transaction is attached.
For programming information about the USERID option, USERIDERR condition, and INVREQ, and NOTAUTH conditions, see the CICS Application Programming Reference manual.
[[ Contents Previous Page | Next Page Index ]]