This section describes how to define CICS security parameters for the CA Top Secret environment. As part of this process, changes have to be made to your CICS tables before starting up CICS with CA Top Secret. The tables needing required, additional, or optional changes are listed next. Details regarding these changes appear in the following sections.
For initial startup, changes may be required in the System Initialization Table (SIT).
For initial startup, additions need to be made to the CSD table for new programs and transactions. Sample CSD table entries can be found in the chapter “CSD PROGRAM and TRANSACTION Sample Entries” and in CAKOJCL0 member TSSCSD.
For initial startup, changes indicating that external security should be involved for the following tables are optional:
The following sections detail the changes you need to make to the SIT and PCT.
The System Initialization Table (SIT) contains parameter settings for CICS initialization. Included in the SIT are security‑related parameters. There are two choices for implementing CA Top Secret security for your CICS region:
Note: If XPARMS are in the DFHSIT, then they are static; if they are in the Facility Matrix Table, they are dynamic.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|