Identifying CICS terminal users

If you are running CICS® with RACF® security checking, you control users' access to CICS resources through levels of authorization you define in RACF-managed resource profiles. You define these authorizations for specific users by adding individual RACF userids (or RACF group IDs) to the resource access lists; or, for unsigned-on users, by adding the default CICS userid to selected resource access lists.

All CICS terminal-user data is defined in the CICS segment of the RACF user profile. See Obtaining CICS-related data for a user for more information about CICS terminal-user data, and how CICS obtains it.