How to prevent user to access a screen directly from cics
Native screen by using Trans Id?
Answer Posted / guest
When CICS security is active, requests to attach transactions, and requests by transactions to access resources, are associated with a user.
When a user makes a request, CICS calls the external security manager to determine if the user has the authority to make the request. If the user does not have the correct authority, CICS denies the request.
There are two distinct areas from which exposures to the CICS system can arise.
The first of these is from sources external to CICS. You can use RACF data set protection as the primary means of preventing unauthorized access, from either TSO users or batch jobs, to the assets CICS manages.
The other potential area of exposure arises from CICS users. CICS provides a variety of security and control mechanisms that can limit the activities of CICS users to only those functions that any particular individual user is authorized to use:
Transaction security - Ensures that users that attempt to run a transaction are entitled to do so
Resource security- Ensures that users who use CICS resources are entitled to do so
Command security - Ensures that users who use CICS system programming commands are entitled to do so
| Is This Answer Correct ? | 3 Yes | 0 No |
Post New Answer View All Answers
Name the two types of transient data queues?
Can you explain differences between temporary storage queue (tsq) and transient data queue (tdq)?
What is task control?
Explain the difference between link xctl?
if i am having a cics,vsam and db2 programs with each functions and i want that each function on screen?
Explain the difference between exec cics handle condtion and an exec cics ignore command?
What is the type of ppt in the cics?
Explain ceci transaction commands?
Explain how many conditions can you include in a single handle condition command?
what are transient data sets defined to cics?
Explain what is the massinsert option?
Specify cics transaction initiation process?
What do you mean by CEMT?
Can you explain enq and deq used in cics?
Explain the difference between the into and the set option in the exec cics receive map command?