Intersystem security
The security requirements for a region that communicates with other systems are an extension of the security requirements for a single, stand-alone region. CICS security uses the concepts of user sign-on to give a user authority to access sensitive transactions and resources. These facilities are extended for intercommunication functions to include the remote users and remote systems.
For more information on intersystem security, see the following topics: