The security profile

A new profile DWWCICSVR needs to be defined to the FACILITY class in your security product. The security administrator can then permit various levels of access to this profile for all users of CICS® VR.

In general, a user can have NONE, READ, UPDATE, CONTROL or ALTER as the permitted level of access for a particular task. If the user tries to perform a function without the proper level of access, a pop-up message is displayed on the panel, advising that the user is not authorized to perform this function, and must contact the security administrator requesting access. This table shows the access levels required in the DWWCICSVR profile for a user to perform particular tasks:
Table 1. Access levels required to perform tasks
Task Access level Class
Changing any retention periods for automatic backup deregister, automatic mvslog deregister or automatic CA deregister ALTER FACILITY
Register or deregister a VSAM sphere entry from RCDS, using the sphere list panel CONTROL (for the sphere to be registered or deregistered) DATASET
Deregister a log entry from the CICS VR log stream list CONTROL FACILITY
Register or deregister a log of logs entry from the CICS VR log of logs list CONTROL FACILITY
Deregister a CICS backout failed sphere entry from the CICS Backout Failed sphere list CONTROL FACILITY
Change the CICS VR automation level ALTER FACILITY
Setting CICS VR server address space defaults or scavenger parameters ALTER FACILITY
Note: Less strict access control is required for a user to deregister a CICS backout failed sphere because the sphere remains registered in RCDS as a VSAM sphere.
Example
RDEFINE FACILITY DWWCICSVR
PERMIT DWWCICSVR ACCESS(READ) CLASS(FACILITY) ID(userid)