CEDA - resource definition online
Use CEDA to define resources to your CICS® system while the system is running. With CEDA, you can update both the CICS system definition file (CSD) and the running CICS system.
Security checking for CEDA transaction
There is no resource or command security in the CEDA transaction. Security in CEDA is limited to the initial transaction security and to surrogate security on the install of resources that are defined with a user ID other than the user ID of the user that issues the command. You restrict access to some functions of CEDA by restricting users' access to the CEDB and CEDC transactions, which offer only a sub-set of CEDA functions.
For programming information about command security checking, see Security checking.
What functions are available in CEDB and CEDC
CEDB and CEDC allow a user to use a restricted subset of the functions provided by CEDA. The following table shows what functions are available with each transaction.
| Transaction |
|
|
INSTALL |
|---|---|---|---|
| CEDA | Yes | Yes | Yes |
| CEDB | Yes | Yes | No |
| CEDC | Yes | No | No |