Previous Topic: Defining Permission for a Region ACID to Its VTAM APPLIDNext Topic: SIT Security Parameter Settings


CICS Table Changes

This section describes how to define CICS security parameters for the CA Top Secret environment. As part of this process, changes have to be made to your CICS tables before starting up CICS with CA Top Secret. The tables needing required, additional, or optional changes are listed next. Details regarding these changes appear in the following sections.

Required CICS Table Changes

For initial startup, changes may be required in the System Initialization Table (SIT).

Additional CICS Table Entries

For initial startup, additions need to be made to the CSD table for new programs and transactions. Sample CSD table entries can be found in the chapter “CSD PROGRAM and TRANSACTION Sample Entries” and in CAKOJCL0 member TSSCSD.

Optional CICS Table Changes

For initial startup, changes indicating that external security should be involved for the following tables are optional:

Required Table Changes

The following sections detail the changes you need to make to the SIT and PCT.

The System Initialization Table (SIT)

The System Initialization Table (SIT) contains parameter settings for CICS initialization. Included in the SIT are security‑related parameters. There are two choices for implementing CA Top Secret security for your CICS region:

Note: If XPARMS are in the DFHSIT, then they are static; if they are in the Facility Matrix Table, they are dynamic.