Protecting non-terminal transactions

For all resource security checking, CICS® needs a userid or an ICRX which maps to a userid to check the user's authority to access the resource

CICS can protect resources against unauthorized use if those resources are used in transactions that are not associated with a terminal. In addition to transactions started by an EXEC CICS START command without a terminal identifier specified, there are two other types:
  • Transactions started without a terminal when the trigger level is reached for an intrapartition transient data queue
  • Programs executed from the second phase of the program list table (PLT) during CICS startup
Note: Distributed identity information is not preserved when a START command is run with any of the parameters: USERID, or TERMID, or is shipped across an LU61 or LU62 connection.