Protecting non-terminal transactions
For all resource security checking, CICS® needs a userid or an ICRX which maps to a userid to check the user's authority to access the resource
CICS can protect resources
against unauthorized use if those resources are used in transactions
that are not associated with a terminal. In addition to transactions
started by an EXEC CICS START
command without a terminal identifier specified, there are two other
types:
- Transactions started without a terminal when the trigger level is reached for an intrapartition transient data queue
- Programs executed from the second phase of the program list table (PLT) during CICS startup
Note: Distributed identity information is not preserved when a START command
is run with any of the parameters: USERID, or TERMID,
or is shipped across an LU61 or LU62 connection.