Previous Topic: CICS Table RequirementsNext Topic: Other CA Product Dependencies


Authorization and Security

You grant and restrict access (through CICS SIGNON or through an authorization product such as CA Top Secret or CA ACF2) to the following CA Datacom CICS Services transactions:

DBIC

Provides a series of inquiry commands for monitoring the status of system resources. For details on DBIC functions, see the User Guide.

DBOC

Provides all of the facilities of DBIC plus the ability to control and alter system resources and generation options. For more information about DBOC functions, see Changing Generation Options Online (DBOC GENOPTS).

DBEX

Provides an inquiry function for monitoring the status of system resources on a pageable display in a single CICS or in a MRO/ISC environment. For details on DBEX, see the User Guide.

DBEC

Provides all of the facilities of DBEX plus the ability to alter system resources on a pageable display in a single CICS or in a MRO/ISC environment. For details about DBEC functions, see the User Guide.

DBTX

Provides facilities for issuing CA Datacom/DB read-only requests for examining command syntax and simulating program logic. For details about DBTX functions, see the User Guide.

DBTS

Provides the same facilities as DBTX, but DBTS users are not restricted to read-only CA Datacom/DB access. DBTS users can update the databases. For details about DBTS functions, see the User Guide.

DBUG

Provides facilities for intercepting CA Datacom/DB requests issued by an executing application program, allowing examination of its processing. For details about DBUG functions, see the User Guide.

DBUT

Provides facilities for examining whatever is stored in the CICS region. This utility gives the user online access to any CICS program. We recommend tightly limiting the number of authorized users for this transaction. For details about DBUT functions, see Using the Display Utility (DBUT).

DBRC

Internal only transaction (used with DBEC and DBEX).

DBKC

Internal only transaction used with DBOC and DBEC for EOJ_OK feature; must have the same security credentials as DBOC and DBEC.

DBFS

Internal only transaction used with DBUG for remote terminal interception.

Carefully review the needs of potential CA Datacom CICS Services users at your site. Be sure that you authorize users for the transaction or transactions appropriate for their needs.

Note: Use the DBCVTPR parameters, DBEC=, DBOC=, DBTS=, DBUG= to change transaction IDs for any CA Datacom CICS Services transaction except DBUT. For information, see Specifying Generation Options (DBCVTPR).

These transaction IDs can also be changed online through the DBOC GENOPTS transaction. Verify that the new transaction IDs are defined to CICS. For more information, see Changing Generation Options Online (DBOC GENOPTS). Before using either of these facilities to change the transaction IDs, establish user authorizations for the new transaction ID names.

Additional Security

You can use the DBCVTPR macro to establish a list of master operators who can control access to CA Datacom CICS Services. Only those operators are allowed to start up or shut down CA Datacom CICS Services and change characteristics of the environment. See MSTOPR=.

If CA Datacom CICS Services is started during CICS initialization PLT time then all operations are available when CICS begins control.

If you want to stop using CA Datacom CICS Services, issue the DBOC SHUTDOWN or DBEC PERFORM,SHUTDOWN command which afterwards can only be started by one of the master operators.