Verifying CICS users

To protect resources from unauthorized access, CICS® must be able to identify users of the system when they invoke transactions.