CA Top Secret offers extensive and flexible security protection for CICS regions, transactions, and resources without modifying CICS code.
To sign on to CICS, a user’s ACID must be authorized to access the CICS facility.
To grant access authorization, you can:
CA Top Secret supports the CESN CICS sign on procedure. For information, see the Implementation: CICS Guide.
CA Top Secret sign on processing operates correctly if your installation uses a non‑standard sign on procedure. The CICS DFHSNP sign on program must be invoked.
To secure CICS, enter the command:
TSS ADDTO(user) FACILITY(CICSTEST)
CA Top Secret can be used to:
The TSSTRACK utility that allows security administrators to monitor security‑related events for one or more systems in real time. For information, see the Report and Tracking Guide.
Online jobs submitted under CICS are treated by CA Top Secret as if they were submitted under TSO.
Security administrators can use the TSS command under CICS to perform all security administration.
Changes to the security database made through a TSS command are immediately recognized by all facilities. A user’s TSO access could be administered during a CICS terminal session. Any changes made to an ACID’s security record while that ACID is signed on do not immediately take affect. The ACID must sign off and on for the changes to be registered, or the Security Record must be refreshed with TSS REFRESH.
A user’s CICS security key can be specified using the SCTYKEY keyword on TSS CREATE or ADDTO. Up to 64 security keys can be specified. Security keys are available in all modes.
CA Top Secret for CICS supports multiple concurrent signons by an ACID. This is a site‑selectable option.
Use the SIGN(M) control option to allow simultaneous logons for the same ACID. Use the SIGN(S) control option to disallow simultaneous logons for the same ACID for each CICS region running under a specified facility.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|