To-Do List View

The To-Do list view in CICS Explorer® displays information about issues present in CICS security definitions.

The entries in the To-Do list are referred as issues and each issue provides a description of the issue and its available actions. The issues are visible only after you load an .esm file into CICS Explorer. The security definitions are scanned and the list of issues are displayed in the To-Do list .

Figure 1. To-Do List view
A screen capture shows the To-Do list, with the Issue Description and Available Actions.

The following actions are available for issues displayed in the list:

Hide issue
You can hide the issue if you do not want to resolve it. The hidden issues are available at the top of the list. There are no actions displayed for hidden issues.
Show me
It displays the entry in Security Discovery editor and provides information about the entry in the Security Discovery Details view.
Recommended action
It provides information about the actions you could take to resolve the issue. For example, for an invalid role name, the rename option is suggested to provide a valid name for the role and merge options are displayed for duplicate roles or member lists.

These actions are not available for all the issues displayed in the list. The list of actions vary depending on the type of the issue.

The list of issues and available actions are described in the following table.

Table 1. Issues listed in To-Do list view
Issues Description Available actions
Load model Load the ESM/SDM file for CICS Explorer to scan and display the issues. It is mandatory to load the file to analyze the security definitions.
  • Load ESM file
  • Load SDM file
Analyze transactions Run analysis to group users or resources.
  • Hide issue
  • Show me
  • Perform similarity analysis
  • Perform exact analysis
Ungrouped resources Move resources into member lists or discrete resources.
  • Hide issue
  • Show me
Invalid role name Rename the role. You must resolve this issue.
  • Show me
  • Rename role
  • Duplicate role accesses
  • Duplicate user roles
  • Duplicate member list resources
Merge the roles with same access.
  • Hide issue
  • Show me role 1
  • Show me role 2
  • Merge role 1 into role 2
  • Merge role 2 into role 1
Profile UACC other than NONE UACC other than NONE is not recommended. Convert access to specific permissions.
  • Hide issue
  • Show me
  • Convert UACC access

Profile UACC matching

Specific access and UACC are present at the same level. Convert to specific access.
  • Hide issue
  • Show me
  • Convert UACC access
Profile deny list  Deny lists are not recommended. Convert to specific access.
  • Hide issue
  • Show me
  • Convert UACC access
Member list UACC other than NONE  UACC other than NONE is not recommended. Convert access to specific permissions.
  • Hide issue
  • Show me
  • Convert UACC access
Member list UACC matching  Specific access and UACC are present at the same level. Convert to specific access.
  • Hide issue
  • Show me
  • Convert UACC access
Member list deny list  Deny lists are not recommended. Convert to specific access.
  • Hide issue
  • Show me
  • Convert UACC access
Resource UACC other than NONE  UACC other than NONE is not recommended. Convert access to specific permissions.
  • Hide issue
  • Show me
  • Convert UACC access
Resource UACC matching  Specific access and UACC are present at the same level. Convert to specific access.
  • Hide issue
  • Show me
  • Convert UACC access
Resource deny list  Deny lists are not recommended. Convert to specific access.
  • Hide issue
  • Show me
  • Convert UACC access
Empty role The role does not have any users.
  • Hide issue
  • Show me
  • Delete role
Empty member list The member list does not have any resources
  • Hide issue
  • Show me
  • Delete member list