Security-related system initialization parameters
Several system initialization parameters are available for specifying system security requirements.
- SEC
- The SEC system initialization
parameter specifies the level of resource security management you
want for your CICS® region.
There are two options:
- YES
- Initializes the CICS external security interface; control
of CICS security is determined by the other security-related
system initialization parameters:
CMDSEC XAPPC XPPT DFLTUSER XCMD XPSB ESMEXITS XDB2 XRES PSBCHK XDCT XRFSOFF PLTPISEC XFCT XRFSTME RESSEC XHFS XTRAN SECPRFX XJCT XTST SNSCOPE XPCT XUSER - NO
- No security checking is performed, and no user sign-on is available, for users who want to
access CICS resources and other resources in this region.
Note: Even if you have specified SEC=NO, with MRO bind-time security, the CICS region user ID is sent to the secondary system, and bind-time checking is carried out in the secondary system. See Bind-time security with MRO for more information.
- SECPRFX
- This parameter is effective only if you also specify SEC=YES. Use the SECPRFX system initialization parameter to specify whether you want CICS to prefix the resource names that it passes to RACF® for authorization. The prefix that CICS uses is the RACF user ID under which the CICS region is running.
Prefixing is useful mainly when you have more than one CICS region. It enables you to prevent users on one CICS region from accessing the resources of a different CICS region that has a different prefix. For example, you might have one CICS region with the prefix CICSPROD and another with prefix CICSTEST. Users of the CICSTEST system would be able to use profiles that included the CICSTEST prefix, and users of the CICSPROD system would be able to use profiles that included the CICSPROD prefix. Users of both systems would be able to use resources protected by profiles that included CICS*.
The SECPRFX parameter has the following options:- NO
- CICS does not prefix the resource names in authorization requests that it passes to RACF from this CICS region.
- YES
- CICS prefixes the resource names with the CICS region user ID when passing authorization requests to RACF.
To change these values, use an ICHRTX00 SAF pre-processing exit. For more information, see When and how CICS determines the userid of the CICS region.
- prefix
- CICS prefixes the resource names with the specified prefix when passing authorization requests to RACF.
RDEFINE TCICSTRN CICSREG.CEMT UACC(NONE) NOTIFY(sys_admin_userid) PERMIT CICSREG.CEMT CLASS(TCICSTRN) ID(groupid1,...,groupidn) ACCESS(READ)You can also use a resource group profile in the GCICSTRN resource class. If you do, specify the prefix on the ADDMEM operand. The following example shows CICSREG specified in a profile named CICSTRANS:RDEFINE GCICSTRN CICSTRANS ADDMEM(CICSREG.CEMT) UACC(NONE) NOTIFY(sys_admin_userid) PERMIT CICSTRANS CLASS(GCICSTRN) ID(groupid1,...,groupidn) ACCESS(READ)Note: If you protect a resource with a resource group profile, avoid protecting the same resource with another profile. If the profiles are different (for example, if they have different access lists), RACF merges the profiles for use during authorization checking. Not only can the merging have a performance impact, but it can be difficult to determine exactly which access authority applies to a particular user. For more information see the z/OS Security Server RACF Security Administrator's Guide. - CMDSEC
- Use CMDSEC to specify whether or not you want CICS to use the CMDSEC option specified on a transaction's resource definition. CMDSEC specified with the option ASIS means that CICS obeys the CMDSEC option. CMDSEC specified with the option ALWAYS means that CICS ignores the CMDSEC option, and always performs the command check. For more information about these options, see CMDSEC system initialization parameter.
- DFLTUSER
- Specify a value for DFLTUSER to identify to CICS the name you have defined to RACF as the default user ID. If you omit this parameter, the name defaults to CICSUSER. See Defining the default CICS user ID to RACF.
- ESMEXITS
- Use ESMEXITS to specify whether you want CICS to pass installation data for use by the RACF installation exits.
- PLTPISEC
- Use PLTPISEC to specify whether or not you want CICS to perform command security or resource security checking for PLT programs that run during CICS initialization.
- PLTPIUSR
- Use PLTPIUSR to specify the userid that CICS is to use for security checking for PLT programs that run during CICS initialization.
- PSBCHK
- Code PSBCHK to specify that you want CICS to perform PSB authorization checks for remote terminal users who use transaction routing to initiate a transaction in this CICS region (to access an attached IMS system). The default PSBCHK=NO specifies that CICS is to check the remote link but not the remote user. The remote user is checked by specifying PSBCHK=YES.
- RESSEC
- Use RESSEC to specify whether or not you want CICS to honor the RESSEC option specified on a transaction's resource definition. RESSEC specified with the option ASIS means that CICS obeys the RESSEC option. RESSEC specified with the option ALWAYS means that CICS ignores the RESSEC option, and always performs the resource check.
- SNSCOPE
- SNSCOPE, the sign-on SCOPE, applies to all user IDs
that are signing on by explicit sign-on request; for example, the EXEC CICS SIGNON command or the CESN transaction. Use SNSCOPE to specify whether or
not a user ID can have more than one CICS session active at
the same time.
The sign-on SCOPE is enforced with the MVS™ ENQ macro. The SNSCOPE values correspond to the STEP, SYSTEM, and SYSTEMS levels of ENQ scoping. This means that only those CICS systems that specify exactly the same value for SNSCOPE can check the scope of each other.
SNSCOPE affects only users signing on at local terminals, or signing on after using the CRTE transaction to connect to another system.