CICS® can protect resources used in non-terminal transactions against unauthorized use.
Also, resource security checking can now be carried out for PLT programs that are run during CICS shutdown. PLT shutdown programs execute as part of the transaction that requests the shutdown, and therefore run under the authorization of the user issuing the shutdown command.
The START command handles security for non-terminal transactions started by the START command.
A surrogate user who is authorized to attach a transaction for another user, or cause it to be attached, or who inherits all the resource access authorizations for that transaction, can act for the user.
A separate surrogate user security check is done for each of these userids, as required, before the transaction is attached.
For programming information about the USERID option, USERIDERR condition, and INVREQ, and NOTAUTH conditions, see CICS API commands.