Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How to prevent user to access a screen directly from cics
Native screen by using Trans Id?

Answer Posted / guest

When CICS security is active, requests to attach transactions, and requests by transactions to access resources, are associated with a user.

When a user makes a request, CICS calls the external security manager to determine if the user has the authority to make the request. If the user does not have the correct authority, CICS denies the request.

There are two distinct areas from which exposures to the CICS system can arise.

The first of these is from sources external to CICS. You can use RACF data set protection as the primary means of preventing unauthorized access, from either TSO users or batch jobs, to the assets CICS manages.

The other potential area of exposure arises from CICS users. CICS provides a variety of security and control mechanisms that can limit the activities of CICS users to only those functions that any particular individual user is authorized to use:

Transaction security - Ensures that users that attempt to run a transaction are entitled to do so

Resource security- Ensures that users who use CICS resources are entitled to do so

Command security - Ensures that users who use CICS system programming commands are entitled to do so

Is This Answer Correct ?    3 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Whenever a cics program goes through a compilation process, there is always some extra code that is added to the program. Where exactly does this new piece of code go to and what is it termed as ?

1011


Is length = 0 sufficient to ascertain that the field has been modified?

1049


How to establish dynamic cursor position on a map?

1056


Explain how do you dynamically set the cursor position to a specific field?

1044


What are the terms cics generally means?

983


Can you define ppt and what are its uses?

1048


How do we pass parameters into a CICS –DB2 program

4131


What is program reentrance?

1141


Highlight the difference between a symbolic map and physical map?

1103


Explain the logical message in cics?

1005


how do you intitiate another transaction?

1152


What are the main uses of the transaction in the cics?

1017


mention the option (along with argument type) used in a cics command to retrieve the response code after execution of the command?

1168


what are the differences between and exec cics xctl and an exec cics link command?

1281


Explain the primary significance of intra-partition and extra-partition tdqs ?

1054