An example of running a secure transaction

Assume that a user’s definition contains TSL keys 1, 2, and 4. Two of the transactions in the user’s system are ACCO and PERS. ACCO has a TSL key of 2, and PERS has a TSL key of 5.

If the user invokes the ACCO transaction, CICS® compares the TSL key of the transaction ACCO with the keys that are in the user’s TSL Key List. Because ACCO’s TSL key of 2 is in the list, the user is authorized to run the transaction.

If the user tries to invoke the PERS transaction, CICS compares PERS’s TSL key of 5 with the keys in the user’s TSL key list. Because CICS does not find a TSL key in the user’s list to match that of the PERS transaction, the following occur:

  • CICS does not run the transaction.
  • The transaction PERS abends with abend code A146 (security violation).
  • CICS sends message ERZ014016 with the appropriate details to the terminal.
  • CICS writes the error messages ERZ014016 and ERZ014001 to the console.nnnnnn log. This lets the operator who is checking the log know which user caused the violation.
  • CICS writes error message ERZ045004E to the CSMT log. This specifies a transaction Security violation and again specifies the user and terminal that attempted to run PERS.