Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How to prevent user to access a screen directly from cics
Native screen by using Trans Id?

Answer Posted / guest

When CICS security is active, requests to attach transactions, and requests by transactions to access resources, are associated with a user.

When a user makes a request, CICS calls the external security manager to determine if the user has the authority to make the request. If the user does not have the correct authority, CICS denies the request.

There are two distinct areas from which exposures to the CICS system can arise.

The first of these is from sources external to CICS. You can use RACF data set protection as the primary means of preventing unauthorized access, from either TSO users or batch jobs, to the assets CICS manages.

The other potential area of exposure arises from CICS users. CICS provides a variety of security and control mechanisms that can limit the activities of CICS users to only those functions that any particular individual user is authorized to use:

Transaction security - Ensures that users that attempt to run a transaction are entitled to do so

Resource security- Ensures that users who use CICS resources are entitled to do so

Command security - Ensures that users who use CICS system programming commands are entitled to do so

Is This Answer Correct ?    3 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

if i am having a cics,vsam and db2 programs with each functions and i want that each function on screen?

2251


What is the use of the eibaid field?

1137


when a task suspends all the handle conditions via the push command, how does the task reactivate all the handle conditions?

1165


What is ENQ?

1067


How to handle exceptional conditions in cics?

1124


What is bms map?

1193


Can you explain common systems area?

1092


What is the meaning of the deq command?

1142


Can you explain dfheiblk?

1086


How do we pass parameters into a CICS –DB2 program

4149


Explain the mdt in cics?

1146


Define primary objective of cics?

1000


With the use of an alternate index, how is a VSAM file accessed?

1085


What is the cics command level?

1042


Explain the difference between dfhcommarea and tsq?

1086