In a secure CICS region, set the user ID to your own CICS user ID to establish a personal debugging session. When you set monitoring, specify the program or transaction and specify your own CICS user ID. The monitoring request is then invoked only when you execute the program. In addition, specify your own CICS user ID when you set breakpoints and other monitoring options. When you do this, the monitoring request and any breakpoints and options are automatically directed to any terminal you are signed on to under CICS.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|