Users of external security managers (ESMs) other than the Resource Access Control Facility (RACF) should read this section in conjunction with the documentation for their own ESM.
The security considerations for CICS business transaction services are:
The rest of this section contains:
[[ Contents Previous Page | Next Page Index ]]