You can preset terminal security by permanently associating any ACID with a particular terminal. When the preset terminal is connected to CICS, CICS (as an authorized user) signs the ACID on- bypassing password processing. Since no password is required, use of this feature is secured.
To install a terminal definition using preset security, the terminal operator must have access to the name of the preset USERID in the resource class SURROGAT. For example, to install a terminal with a preset USERID of WAREHOUS, you must first define an ACID called WAREHOUS to CA Top Secret with permission to the CICS facility and any appropriate resources. Then, the user defining the terminal must have access to the resource WAREHOUS.DFHINSTAL in RESCLASS(SURROGAT). Sample statements illustrating these two steps appear next.
TSS ADDTO(CICSDEPT) SURROGAT(WAREHOUS.DFHINSTAL) TSS PERMIT(CICSADM) SURROGAT(WAREHOUS.DFHINSTAL) ACCESS(READ)
Finally, the CICS facility must run with the RES attribute, so that the permissions in the SURROGAT resource class can be stored when the user signs on.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|