Difference between the two CICS user security methods

In either case, you must have TSL and RSL keys assigned to the resources and transactions for which you want user security applied, as described in the discussions of the RSLKey and TSLKey attributes in Using CRTE and CESN/CESL to sign on from a remote system.

This description provides a simple approach to using the resource definitions to set up user security. Using CRTE and CESN/CESL to sign on from a remote system provides further examples and descriptions of how CICS® security resources definitions can be used.