Verifying CICS users
To protect resources from unauthorized access, CICS® must be able to identify users of the system when they invoke transactions.
To protect resources from unauthorized access, CICS® must be able to identify users of the system when they invoke transactions.