You can signon to CICS using an external security package such as CA Top Secret, CA ACF2, or RACF. In each security package, you can customize how this process is carried out. For instance, you can require that each user actually signon to the security package or you can set up a default user for the environment or a particular transaction. You can also let a group of users share the same TP monitor definition.
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|