CICS system resource security
This topic describes how to protect the system resources that CICS® requires.
CICS installation requirements for RACF
Specifying the CICS region userid
Authorizing CICS procedures to run under RACF
Defining user profiles for CICS region userids
Defining the default CICS userid to RACF
Authorizing access to MVS log streams
Authorizing access to CICS data sets
Authorizing access to the temporary storage pools
Authorizing access to temporary storage servers
Authorizing access to named counter pools and servers
Authorizing access to SMSVSAM servers
Authorizing access to the CICS region
Controlling the opening of a CICS region's VTAM ACB
Controlling userid propagation
Surrogate job submission in a CICS environment
Authorizing the CICS region userid as a surrogate user
JES spool protection in a CICS environment
Security-related system initialization parameters
Parent topic:
Implementing RACF protection in a single CICS region