The scope of a particular CEDA command can be limited by a combination of several levels of security checking. The normal transaction-attach security is described in the CICS® RACF® Security Guide. CEDA calls the exec interface programs to process the user’s commands, in much the same way as CECI or a user’s command-level program would. The resource security and the command security used by the command-level programming interface are thus applicable to the master terminal user.
For programming information about command security checking, see the CICS System Programming Reference.
[[ Contents Previous Page | Next Page Index ]]