Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How to prevent user to access a screen directly from cics
Native screen by using Trans Id?

Answers were Sorted based on User's Feedback



How to prevent user to access a screen directly from cics Native screen by using Trans Id?..

Answer / guest

When CICS security is active, requests to attach transactions, and requests by transactions to access resources, are associated with a user.

When a user makes a request, CICS calls the external security manager to determine if the user has the authority to make the request. If the user does not have the correct authority, CICS denies the request.

There are two distinct areas from which exposures to the CICS system can arise.

The first of these is from sources external to CICS. You can use RACF data set protection as the primary means of preventing unauthorized access, from either TSO users or batch jobs, to the assets CICS manages.

The other potential area of exposure arises from CICS users. CICS provides a variety of security and control mechanisms that can limit the activities of CICS users to only those functions that any particular individual user is authorized to use:

Transaction security - Ensures that users that attempt to run a transaction are entitled to do so

Resource security- Ensures that users who use CICS resources are entitled to do so

Command security - Ensures that users who use CICS system programming commands are entitled to do so

Is This Answer Correct ?    3 Yes 0 No

How to prevent user to access a screen directly from cics Native screen by using Trans Id?..

Answer / pinaki

In the application program for the transaction we can use
STARTCODE verification to prevent transaction started with
terminal to through alert message when accessed from CICS
native terminal.

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CICS Interview Questions

cics command level is?

0 Answers   IBM,


What does the 'cedf:cics' transactions do?

0 Answers  


What other file control processing commands are used for file updating?

1 Answers  


What is meant by an AICA ABEND?

0 Answers  


What is the difference between the enter key, the PF keys and the PA keys?

2 Answers  


how to make the entire screen protected. i.e., for example when we design a delete screen before deleting the details we need to popup a screen saying do u wish to delete(Y/N). When this screen appears i want to make the previous screen fields as protected.Please help me with the anser. i need the entire screen to be protected. Thanks in advance

3 Answers   Accenture,


What are the naming conventions for the Temporary Storage Queues?

2 Answers   Sainsburys,


what is effect on receive map when

0 Answers   IBM,


Which of the following are recoverable CICS resources?

1 Answers   IBM,


What is the difference between a package and a plan. How does one bind 2 versions of a CICS

1 Answers  


What are the parameters that you have to give when you are using the CSSN transaction?

3 Answers  


Explain how and where is the twa size set?

0 Answers  


Categories