Security for 3270

The 3270 terminal or emulator is used to connect to CICS®. You need to configure it for secure operations within CICS.

When you decide how to secure the 3270 terminal or emulator, you need to consider the standard security principles: authentication, identification, authorization, integrity, confidentiality, and audit. For a description of these terms, see What does security mean in CICS?.

This section explains the mechanism and options of 3270 security, as well as how to design and configure 3270 security with examples.