Previous Topic: Region ViolationsNext Topic: Defining Bind-Time Security


Using RDO or RDM Parameters

To set up MRO and ISC environments, you must define specific CICS parameters. These parameters can be defined via one of the following:

The following table shows the CICS parameters that you must define (via RDO or RDM) to set up MRO or ISC in your CICS region.

Definition

Using RDO

CONNECTION

ATTACHSEC

SESSION

USERID