IMS and DL/I regions can be connected via ISC to CICS. For more information, see your IBM documentation.
CA Top Secret invokes the External Security Manager and makes checks against the PSB at scheduling time. If the installation is able to schedule the PSB, it returns the DBD names. CA Top Secret checks to determine who has access to the specific DBD, and you must have the appropriate authorization. Access control from CICS where the DBD resides.
If you are not authorized to access the DBD, a DHA4 abend will occur.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|