Implementing CICSPlex SM security

To implement CICSPlex® SM security using RACF®, you must determine who needs access to the various CICSPlex SM functions. You must also perform a number of tasks to define CICSPlex SM class names and resource names, as well as activating security and refreshing RACF profiles.

About this task

If you are using a SAF-compliant external security manager (ESM) other than RACF, refer to Invoking a user-supplied external security manager. The following steps summarize how to set up security for CICSPlex SM. Each of the steps are explained in detail in the subsequent topics.

Procedure

  1. Decide who needs access to CICSPlex SM.
  2. Review the general security requirements for CICSPlex SM.
  3. Create RACF profiles for the CICSPlex SM data sets.
  4. Define the CICSPlex SM started tasks to RACF.
  5. If CICS® transaction security is active in a CMAS, define the CICSPlex SM transactions to RACF.
  6. If CICS transaction security is active in a MAS, define the CICSPlex SM transactions to RACF.
  7. Create RACF profiles for the CICSPlex SM views.
  8. Create RACF profiles for the CICSPlex SM Web User Interface resources.
  9. Optional: Activate simulated security checking using the CICSSYS, CPLEXDEF, or MAS views.
  10. Activate security in the CMASs and MASs using the CICSPlex SM and CICS security-related system initialization parameters.