The QUERY SECURITY command

QUERY SECURITY is effective with RACF® or any equivalent external security manager (ESM). You can use this command to query whether the terminal user has access to resources that are defined to the external security manager. These can be:

The terminal user in this context is the user invoking the transaction that contains the QUERY SECURITY command.

Java and C++

The application programming interface described in this chapter is the EXEC CICS API, which is not used in Java™ programs. For information about Java programs using the JCICS classes to access security control services, see the Java Applications in CICS component of the CICS Information Center and the JCICS Javadoc html documentation. For information about C++ programs using the CICS C++ classes, see the CICS C++ OO Class Libraries manual.

In response to a QUERY SECURITY command, CICS returns information about the terminal user’s security authorizations. CICS obtains this information from the external security manager. You can code the application to proceed in different ways depending on the user’s permitted accesses.

You specify the type of resource that you are querying by the CICS resource type name. For example, if you want to query a user’s authorization to access a file, you can specify RESTYPE(‘FILE’). To identify a particular file within the type, you specify the RESID parameter.

[[ Contents Previous Page | Next Page Index ]]