Command-level security

If your installation uses CICS command-level security, you can restrict access to the EXEC CICS FEPI system programming commands (and to the equivalent commands that you can issue with the CEMT main terminal transaction) by defining access authorizations to your external security manager (ESM).

The commands you can protect in this way are those listed in FEPI system programming reference and in the CEMT section of Operator control of FEPI. You cannot restrict access to the FEPI application programming commands (as listed in FEPI application programming reference).

To protect the FEPI system programming commands, use the resource identifier FEPIRESOURCE when defining resource profiles to the ESM. Note that, if you use command security, you must ensure that authorized users of CEMT are also authorized to use the FEPI commands.

For RACF® users, details of how to define resource profiles to the ESM are in the z/OS Security Server RACF Security Administrator's Guide. For information about using RACF with CICS, see Securing. Users of other security managers must refer to the documentation for their own product.