Previous Topic: Defining Attach-time SecurityNext Topic: Signing On to CICS Under CA Top Secret


Implementing Security

This section contains the following topics:

Day to Day Operations

Signing On to CICS Under CA Top Secret

Administering Passwords

Administering Transaction Security

Administering Resource Level Security

Administering Record Level Protection (RLP)

Administering Screen Level Protection (SLP)

Administering Terminal Security

Administering Transient Data Security

Administering Job Submission

Implementing RLP

Administering CICS Command Security

Securing the CSD Command

Securing DL/I PSBs and DBDs

Using Resource Caching

Day to Day Operations

The day‑to‑day operations you need to administer your CICS system in a secured environment include the following:

Note: The PassTicket feature for signing on to a host system is available for CICS. See the User Guide for details on PassTicket.