Intercommunication security

Intercommunication security ensures that users of one CICS® system are entitled to run transactions and access resources in another CICS system. Intercommunication security in CICS is concerned with incoming requests for access to CICS resources instead of requests that are sent out to other systems. Security issues with incoming requests arise when a given user at a given remote system tries to access resources of your local system. You need to determine if this access is authorized or whether the access should be rejected.

For connected systems, the same principles of protecting CICS resources, commands, and transactions apply, but you also have to consider the resource definitions for the connections. You need to allow for the fact that users of one CICS system can initiate transactions and access resources in another CICS system. You might have to define a RACF® user profile or group profile more than once: you might have to define these profiles in each CICS system that is using a separate RACF database, and in which a user is likely to want to attach a transaction or access a resource.

When planning the RACF profiles, you must consider all cases in which a user could initiate function shipping, transaction routing, asynchronous processing, distributed program link, distributed transaction processing, or external call interface (EXCI). For descriptions of these methods of intercommunication, see Distributed transaction processing overview.

There are three types of link that you can use between CICS systems:
MRO (Multiregion operation)
MRO is a CICS-to-CICS facility that does not require a network connection such as TCP/IP or SNA. MRO can be used between CICS regions that are in the same z/OS® LPAR or in the same z/OS sysplex and joined by the z/OS coupling facility.
IPIC
For communication between CICS and non-CICS systems, or between CICS systems that are not in the same LPAR or z/OS sysplex, a network access method provides the necessary communication protocols. When this protocol is TCP/IP, communication is known as IP interconnectivity or IPIC.
ISC
For communication between CICS and non-CICS systems, or between CICS systems that are not in the same LPAR or z/OS sysplex, a network access method provides the necessary communication protocols. When this protocol is SNA (either LU6.1 or LU6.2), communication is known as intersystem interconnectivity or ISC.

You are recommended to connect systems through IPIC instead of ISC. ISC is listed here only for legacy purposes and no further documentation about it is provided in this section.

There are three elements to intercommunication security:
Bind time security
Bind time security prevents an unauthorized system from connecting to CICS.
Link security
Link security controls what access is authorized over the link between the two systems.
User security
User security controls what the requester is authorized to do.

Requests that run in the local system are security-checked by both the asserted user ID and the link user ID. Both user IDs are optional, depending on how you have configured CICS. If both are available, then the task user ID is derived from the asserted user ID. For information about the different user IDs used in CICS security processing, see How it works: Identification in CICS.

Each link between systems is given an authority that is defined by a link user ID. Link security defines the transactions and resources that the remote system is allowed to access across the connection. For information about how the link user ID is set for IPIC, see How it works: IPIC link security.

Users cannot access any transactions or resources over a link that is itself unauthorized to access them. This means that each user's authorization is a subset of the authority of the link as a whole.

Link security works with the other forms of authorization, such as Transaction security or Resource security to govern what the link user ID can access or do in CICS. For example, resource security controls the authority of the link user ID to access resources.

Link authority is established just after the connection (IPIC) or session (MRO) is bound, by sign on of a user ID that is determined by the attributes below.

In addition to the security profile that you set up for the link user ID, you can further restrict each remote user's access to the transactions, commands, and resources in your system. For information for IPIC, see How it works: IPIC user security.

User security works with the other forms of authorization, such as Transaction security or Resource security to govern what the remote user can access or do in CICS. For example, resource security controls the authority of the remote user to access resources in the local system.