Restricting use of the CEDA transaction

If the CEDA transaction is enabled on your production CICS regions, restrict its use to authorized users. This gives you control over who can define resources, such as terminals, to CICS. See Security for CICS-supplied transactions for information about protecting CICS-supplied transactions.