Managing connection requests from local applications
Different local processes enter the access control procedure at different points, depending on the environment in which they originate.
The following processes go through connection processing only:
- Requests originating in TSO foreground and background (including online utilities and requests through the call attachment facility)
- JES-initiated batch jobs
- Requests through started task control address spaces (from the z/OS® START command)
The following processes go through connection processing and can later go through the sign-on processing:
- The IMS™ control region.
- The CICS® recovery coordination task.
- DL/I batch.
- Applications that connect using the Resource Recovery Services attachment facility (RRSAF).
The following processes go through sign-on processing:
- Requests from IMS dependent regions (including MPP, BMP, and Fast Path)
- CICS transaction subtasks
IMS, CICS, RRSAF, and DDF-to-DDF connections can send a sign-on request, typically to execute an application plan. That request must provide a primary ID, and can also provide secondary IDs. After a plan is allocated, it need not be deallocated until a new plan is required. A different transaction can use the same plan by issuing a new sign-on request with a new primary ID.