Defining generic profiles for resources
If you control access to CICS® transactions by means of transaction-attach security, there is probably only a very small subset of other resource types for which you need a further level of RACF® protection.
For example, there may be just a few programs in the CICS application
program resource class that are particularly sensitive, and a much
larger number that constitute no significant risk. In this case, you
could protect the few by defining specific RACF profiles for only
those programs that are sensitive. You ensure that everyone can access
the remaining, nonsensitive, programs by defining a completely generic
resource profile, as follows:
RDEFINE MCICSPPT * UACC(READ) ...
This profile applies to any authorization request for programs not covered by one of the specific profiles. RACF processing logic is such that the most specific profile for any given resource name is always used.
Note that to determine whether a profile is generic, you need only check if 'G' appears after the name of the profile when it is listed with RLIST or SEARCH. For example:
SEARCH CLASS(TCICSTRN)
may give the following output:
C*
CED% (G)
** (G)
This output shows that both CED% and ** are generic
profiles. The C* profile is not generic because it is not followed
by (G). This could have occurred if the C* profile was created before
generic profiles had been enabled with a SETROPTS command. The C*
profile can be deleted and redefined as a proper generic profile as
follows:SETROPTS NOGENERIC(TCICSTRN)
SETROPTS NOGENCMD(TCICSTRN)
RDEL TCICSTRN C*
SETROPTS GENERIC(TCICSTRN)
RDEFINE TCICSTRN C* UACC(NONE)