Defining generic profiles for resources
If you control access to CICS® transactions by means of transaction-attach security, there is probably only a very small subset of other resource types for which you need a further level of RACF® protection.
For example, there may be just a few programs in the CICS
application program resource class that are particularly sensitive, and a much larger number that
constitute no significant risk. In this case, you could protect the few by defining specific RACF profiles for only those programs that are sensitive. You
ensure that everyone can access the remaining, nonsensitive, programs by defining a completely
generic resource profile, as follows:
RDEFINE MCICSPPT * UACC(READ) ...This profile applies to any authorization request for programs not covered by one of the specific profiles. RACF processing logic is such that the most specific profile for any given resource name is always used.
Note that to determine whether a profile is generic, you need only check if 'G' appears after the name of the profile when it is listed with RLIST or SEARCH. For example:
SEARCH CLASS(TCICSTRN)
may give the following output:
C*
CED% (G)
** (G) This output shows that both CED% and ** are generic
profiles. The C* profile is not generic because it is not followed
by (G). This could have occurred if the C* profile was created before
generic profiles had been enabled with a SETROPTS command. The C*
profile can be deleted and redefined as a proper generic profile as
follows:SETROPTS NOGENERIC(TCICSTRN)
SETROPTS NOGENCMD(TCICSTRN)
RDEL TCICSTRN C*
SETROPTS GENERIC(TCICSTRN)
RDEFINE TCICSTRN C* UACC(NONE)