How it works: Authorization in CICS
CICS® Transaction Server for z/OS® uses RACF® to authorize a user identifier (user ID) to a specified resource. Authorization is based on an identifier that is either trusted or has been previously authenticated.
CICS checks authorization to:
You can further manipulate these capabilities to:
- Customize the CICS authorization checks in your application. The application can use the CICS API to determine a user's level of access to a resource (application-specific authorization). For more information, see Application-specific security (QUERY SECURITY).
- Issue requests on behalf of other users (surrogate authorization). For more information, see Surrogate security.