Protecting non-terminal transactions
For all resource security checking, CICS® needs a userid or an ICRX which maps to a userid to check the user's authority to access the resource.
CICS can protect resources against unauthorized use if those resources are used in transactions that are not associated with a terminal.
Types of non-terminal transactions include the following:
- Transactions started by an EXEC CICS START command without a terminal identifier specified
- Transactions started by a RUN TRANSID command
- Transactions started without a terminal when the trigger level is reached for an intrapartition transient data queue
- Programs executed from the second phase of the program list table (PLT) during CICS startup
Note: Distributed identity information is not preserved when a START command is
run with any of the parameters USERID or TERMID, or is
shipped across an LU61 or LU62 connection.