Security Checking Using CICS

You can use CICS-supplied security to restrict which operators can access defined resources within a CICS® environment.

The security check works by using the NetView operator ID that invoked the CICS Automation function. When the function to be performed is invoked in the NetView environment, the invoking operator ID is passed to the CICS system on which the action will be taken. The appropriate transaction or function is invoked, and the NetView operator ID is used in all CICS security checks.

To use this security, you must:

  • Define all NetView operators which will invoke CICS functions to RACF® (or your SAF-compliant security system). This will include:
    • Regular NetView operators
    • NetView autotasks which perform CICS-related actions. These autotasks include those autotasks specifically defined for CICS Automation use, and may include the autotasks which process shutdown functions or resychronization functions.
  • Define RACF surrogate authorization for CICS.
  • Connect the NetView operators to the CICS resources which they will need to access, such as transactions, programs and files. This connection is done through your SAF security manager (such as RACF).
  • Enable the security by modifying the EVESPINM member and specifying USERID=YES to enable extended support. For more information on EVESPINM, see EVESPINM: CICS PPI Initialization Member.
  • Enable non-terminal transaction security in CICS by modifying the CICS SIT to specify XTRAN=YES and XUSER=YES. Additional CICS definitions may require similar modification, such as PLTPIUSER.
Note: In order to perform any of the basic functions of CICS Automation, such as displaying subsystem information, an operator must be authorized to use the ACF command.