Protecting non-terminal transactions

For all resource security checking, CICS® needs a userid or an ICRX which maps to a userid to check the user's authority to access the resource.

CICS can protect resources against unauthorized use if those resources are used in transactions that are not associated with a terminal.

Types of non-terminal transactions include the following:
  • Transactions started by an EXEC CICS START command without a terminal identifier specified
  • Transactions started by a RUN TRANSID command
  • Transactions started without a terminal when the trigger level is reached for an intrapartition transient data queue
  • Programs executed from the second phase of the program list table (PLT) during CICS startup
Note: Distributed identity information is not preserved when a START command is run with any of the parameters USERID or TERMID, or is shipped across an LU61 or LU62 connection.