Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How to prevent user to access a screen directly from cics
Native screen by using Trans Id?

Answers were Sorted based on User's Feedback



How to prevent user to access a screen directly from cics Native screen by using Trans Id?..

Answer / guest

When CICS security is active, requests to attach transactions, and requests by transactions to access resources, are associated with a user.

When a user makes a request, CICS calls the external security manager to determine if the user has the authority to make the request. If the user does not have the correct authority, CICS denies the request.

There are two distinct areas from which exposures to the CICS system can arise.

The first of these is from sources external to CICS. You can use RACF data set protection as the primary means of preventing unauthorized access, from either TSO users or batch jobs, to the assets CICS manages.

The other potential area of exposure arises from CICS users. CICS provides a variety of security and control mechanisms that can limit the activities of CICS users to only those functions that any particular individual user is authorized to use:

Transaction security - Ensures that users that attempt to run a transaction are entitled to do so

Resource security- Ensures that users who use CICS resources are entitled to do so

Command security - Ensures that users who use CICS system programming commands are entitled to do so

Is This Answer Correct ?    3 Yes 0 No

How to prevent user to access a screen directly from cics Native screen by using Trans Id?..

Answer / pinaki

In the application program for the transaction we can use
STARTCODE verification to prevent transaction started with
terminal to through alert message when accessed from CICS
native terminal.

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CICS Interview Questions

Explain the difference between and exec cics xctl and an exec cics link command?

0 Answers  


Thru web page we have triggered the transaction, how can we come to know that whether it has hit the mianframes or not?

2 Answers  


What is the use of DSECT parameter in BMS?

2 Answers   IBM, Xansa,


After execute the map, What will happen ? Give breif Description

4 Answers   HCL, IBM,


mention the option (along with argument type) used in a cics command to retrieve the response code after execution of the command?

0 Answers   IBM,


Define cedf?

0 Answers  


I have a Field which is of size 9(4). In the Screen if I enter the value for this field as 1234, it showing it as Valid. But if I enter only one or two digits, zeros should be appended in the remaining places. For example: When u enter 1 in the screen the output should be 0001. When you enter 12, output should be 0012. How to achieve this in the program?

7 Answers  


when you compile a cics program, the (pre) compiler puts an extra chunk of code. Where does it get included and that is it called? What is its length?

0 Answers   IBM,


What is ENQ, DEQ ?

1 Answers   IBM,


Mention the option used in a cics command to retrieve the response code after execution of the command?

0 Answers  


kindly specify the pic clause for the following:any bll cell, data type of length option field, hhmmss type of data fields?

0 Answers   IBM,


For protecting a transaction using the transaction security function, the two things that must be done are?

0 Answers  


Categories