This section contains the following topics:
Signing On to CICS Under CA Top Secret
Administering Transaction Security
Administering Resource Level Security
Administering Record Level Protection (RLP)
Administering Screen Level Protection (SLP)
Administering Terminal Security
Administering Transient Data Security
Administering CICS Command Security
The day‑to‑day operations you need to administer your CICS system in a secured environment include the following:
Note: The PassTicket feature for signing on to a host system is available for CICS. See the User Guide for details on PassTicket.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|