How to prevent user to access a screen directly from cics
Native screen by using Trans Id?
Answers were Sorted based on User's Feedback
Answer / guest
When CICS security is active, requests to attach transactions, and requests by transactions to access resources, are associated with a user.
When a user makes a request, CICS calls the external security manager to determine if the user has the authority to make the request. If the user does not have the correct authority, CICS denies the request.
There are two distinct areas from which exposures to the CICS system can arise.
The first of these is from sources external to CICS. You can use RACF data set protection as the primary means of preventing unauthorized access, from either TSO users or batch jobs, to the assets CICS manages.
The other potential area of exposure arises from CICS users. CICS provides a variety of security and control mechanisms that can limit the activities of CICS users to only those functions that any particular individual user is authorized to use:
Transaction security - Ensures that users that attempt to run a transaction are entitled to do so
Resource security- Ensures that users who use CICS resources are entitled to do so
Command security - Ensures that users who use CICS system programming commands are entitled to do so
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / pinaki
In the application program for the transaction we can use
STARTCODE verification to prevent transaction started with
terminal to through alert message when accessed from CICS
native terminal.
Is This Answer Correct ? | 1 Yes | 0 No |
What is the difference between a package and a plan. How does one bind 2 versions of a CICS
What is bms map?
Can you define multiple maps in a BMS mapset?
Which command is used to release a record on which exclusive control is gained?
mention the option (along with argument type) used in a cics command to retrieve the response code after execution of the command?
Why do we need integrated cics translator?
plz give the syntax for receive map and receive text cmds in cics
What are the terms cics generally means?
If no exception handling is provided in the program, what will happen ?
Explain the different ways of initiating transaction in cics?
What does the 'cemt:cics' transactions do?
name the command that is used to dump the main storage areas related to a task?