Previous Topic: Additional SuboptionsNext Topic: Security for a Multi-System Environment


Transaction Validation

The following chart illustrates CA Top Secret CICS transaction validation logic.

The following chart illustrates CA Top Secret CICS security call processing: