How to prevent user to access a screen directly from cics
Native screen by using Trans Id?
Answers were Sorted based on User's Feedback
Answer / guest
When CICS security is active, requests to attach transactions, and requests by transactions to access resources, are associated with a user.
When a user makes a request, CICS calls the external security manager to determine if the user has the authority to make the request. If the user does not have the correct authority, CICS denies the request.
There are two distinct areas from which exposures to the CICS system can arise.
The first of these is from sources external to CICS. You can use RACF data set protection as the primary means of preventing unauthorized access, from either TSO users or batch jobs, to the assets CICS manages.
The other potential area of exposure arises from CICS users. CICS provides a variety of security and control mechanisms that can limit the activities of CICS users to only those functions that any particular individual user is authorized to use:
Transaction security - Ensures that users that attempt to run a transaction are entitled to do so
Resource security- Ensures that users who use CICS resources are entitled to do so
Command security - Ensures that users who use CICS system programming commands are entitled to do so
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / pinaki
In the application program for the transaction we can use
STARTCODE verification to prevent transaction started with
terminal to through alert message when accessed from CICS
native terminal.
| Is This Answer Correct ? | 1 Yes | 0 No |
I was asked in HSBC interview following questions: 1. A string was given " techincal seminar on cobol language" Interviewer asked me to calculate the number of vowels in this string.
What is the comaera (communication area)?
Explain how many conditions can you include in a single handle condition command?
what is amp?
Can QSAM files be accessed from CICS?
What is journal recovery?
Can we use both FSET n FRSET together in BMS? And if yes then what will happen?
How and where is the TWA size set? .
Define task work area?
What are the two ways of breaking a CPU bound process to allow other tasks to gain access to CPU.
how we change the vsam file name in cics rigion? anybody elobrate this?
How does COBOL11 and CICS release 1.7 provide for exceptional and how does that differ from VS COBOL and earlier CICS release?