To-Do List View
The To-Do list view in CICS Explorer® displays information about issues present in CICS security definitions.
The entries in the To-Do list are referred as issues and each issue provides a description of the issue and its available actions. The issues are visible only after you load an .esm file into CICS Explorer. The security definitions are scanned and the list of issues are displayed in the To-Do list .

The following actions are available for issues displayed in the list:
- Hide issue
- You can hide the issue if you do not want to resolve it. The hidden issues are available at the top of the list. There are no actions displayed for hidden issues.
- Show me
- It displays the entry in Security Discovery editor and provides information about the entry in the Security Discovery Details view.
- Recommended action
- It provides information about the actions you could take to resolve the issue. For example, for an invalid role name, the rename option is suggested to provide a valid name for the role and merge options are displayed for duplicate roles or member lists.
These actions are not available for all the issues displayed in the list. The list of actions vary depending on the type of the issue.
The list of issues and available actions are described in the following table.
| Issues | Description | Available actions |
|---|---|---|
| Load model | Load the ESM/SDM file for CICS Explorer to scan and display the issues. It is mandatory to load the file to analyze the security definitions. |
|
| Analyze transactions | Run analysis to group users or resources. |
|
| Ungrouped resources | Move resources into member lists or discrete resources. |
|
| Invalid role name | Rename the role. You must resolve this issue. |
|
|
Merge the roles with same access. |
|
| Profile UACC other than NONE | UACC other than NONE is not recommended. Convert access to specific permissions. |
|
|
Profile UACC matching |
Specific access and UACC are present at the same level. Convert to specific access. |
|
| Profile deny list | Deny lists are not recommended. Convert to specific access. |
|
| Member list UACC other than NONE | UACC other than NONE is not recommended. Convert access to specific permissions. |
|
| Member list UACC matching | Specific access and UACC are present at the same level. Convert to specific access. |
|
| Member list deny list | Deny lists are not recommended. Convert to specific access. |
|
| Resource UACC other than NONE | UACC other than NONE is not recommended. Convert access to specific permissions. |
|
| Resource UACC matching | Specific access and UACC are present at the same level. Convert to specific access. |
|
| Resource deny list | Deny lists are not recommended. Convert to specific access. |
|
| Empty role | The role does not have any users. |
|
| Empty member list | The member list does not have any resources |
|