Command name | Access required |
---|---|
COLLECT |
READ |
DISABLE |
UPDATE |
CREATE |
ALTER |
Note: Because the PERFORM CORBASERVER
SCAN may result in the dynamic creation and installation of DJAR resources,
the PERFORM CORBASERVER SCAN command requires ALTER access to the DJAR command
security resource as well as UPDATE authority to the CORBASERVER resource.
|
Command security operates in addition to any transaction or resource security you define for a transaction. For example, if a user is permitted to use a transaction called FILA, which issues an EXEC CICS INQUIRE FILE command that the user is not permitted to use, CICS issues a "not authorized" (NOTAUTH) condition in response to the command, and the command fails.
Front End Programming Interface security uses the same mechanism for authorization as the system programming commands, using the FEPIRESOURCE resource name. Front End Programming Interface security is not discussed in this book. See the CICS Front End Programming Interface User's Guide for details.