Controlling access to DB2-related resources in CICS
You can control access to DB2® resources in your CICS® region, and initiate security checking for the resources, by enabling an external security manager and the appropriate CICS security mechanism.
About this task
CICS users might
want to perform the following activities involving DB2:
- Inquire on, modify, create or discard DB2CONN, DB2ENTRY, and DB2TRAN resource definitions.
- Use a transaction that accesses DB2 to obtain data, or issue CICS DB2 attachment facility commands or DB2 commands using the DSNC transaction.
Enabling the appropriate security mechanism for your CICS region: transaction-attach security, resource security, command security, or surrogate security.
For more information about CICS security, see Securing.