The following suboptions are CICS specific and can be used when you have specified TYPE=CICS as the FACILITY option. For information of how these CICS suboptions are used, see the Implementation: CICS Guide.
CICS BYPASS Resource LIST and CICS PROTECT Resource LIST
The following suboptions comprise the CICS BYPASS and CICS PROTECT resource lists:
Lists all CICS resources on the bypass list and protect list.
To display the default Bypass and Protect Lists, issue command:
TSS MODIFY(FACILITY(CICSPROD=BYPLIST))
Results of the command are displayed below:
FACILITY DISPLAY FOR CICSPROD
BYPASS TABLE DISPLAY FOR FACILITY CICSPROD
RESOURCE=LOCKTIME BYPASS NAMES: TSS
RESOURCE=TRANID BYPASS NAMES: CAQP CATA CATD CATP
CATR CAUT CCIN CCMF CDBD CDBN CDBO CDBT
CDTS CECS CEGN CEHP CEHS CESC CESF CESN
CFTS CGRP CITS CLQ2 CLR1 CLR2 CLS3 CLS4
CMPX CMTS CNPX COVR CPLT CPMI CQPI CQPO
CQRY CRDR CRMD CRSQ CRSR CRSY CRTE CRTR
CSAC CSCY CSFU CSGM CSGX CSHR CSIR CSJC
CSKP CSLG CSMI CSM1 CSM2 CSM3 CSM4 CSM5
CSNC CSNE CSPG CSPK CSRK CSPP CSPQ CSPS
CSRS CSSC CSSF CSSN CSSX CSSY CSTA CSTB
CSTE CSTP CSTT CSXM CSXX CSZI CVMI CVST
CWTR CXCU CXRE CXRT TS 8888 9999 ....
.... .... .... .... .... CFTL CFSL CKTI
CKAM CFCL CIOD CIOF CIOR CIRR CJTR CSHA
CSHQ CSOL CTSD CWBG CWXN CDBF CEX2 CFQR
CFQS CSFR CSQC CDBQ CRMF CLSG CFOR CJMJ
CLS1 CLS2 CPIH CPIL CPIQ CRTP CWXU CFTS
CPIR
RESOURCE=TRANID PROTECT NAMES: CEDF TSS TSSC
Note: The ellipsis (….) punctuation in the above is essential and represents internal CICS transactions with hexadecimal unprintable names.
Specifies a CICS resource prefix that is added to the bypass list. Resources of this class that match this prefix is not checked by CA‑Top Secret security when used on a CICS with this facility.
Note: If you are running CTS 2.1 transaction CEJR must be added to the tranid bypass list. For example:
TSS MODIFY FAC(CICSPROD=BYPADD(TRANID=CEJR))
Specifies a CICS resource prefix that is removed from the bypass list.
Contains the resource names for CICS keywords DB2CONN, DB2ENTRY, and DB2TRANS. These resource names are checked against the resource class associated with the XDB2 SIT or FACILITY option. For example, DB2=P8 would bypass security checking for DB2CONN(P8*), DB2ENTRY(P8*), and DB2TRANS(P8*) when FACMATRX=YES and XDB2=YES in the associated CICS facility.
Specifies CICS resources that are added to the protect list and will override a (generally shorter) entry on the bypass list.
Specifies CICS resources that are removed from the protect list.
Resources can be added to the bypass list to avoid checking by CA‑Top Secret or to the protect list to be checked. If a resource is added to both lists the entry on the protect list will override the bypass list. For example, if the following entry is made on the bypass list all transactions beginning with XY will avoid security checking:
TSS MODIFY FACILITY(CICSTEST=BYPADD(TRANID=XY)
You can still check for security on transaction XYZ by entering:
TSS MODIFY FACILITY(CICSTEST=PROTADD(TRANID=XYZ)
The PROTADD(TRANID=XYZ) command overrides the BYPADD(TRANID=XY) command. The transactions XYAB and XYQZ match the prefix on the bypass list but do not match the override protection in the protect list: these transactions would be bypassed. The transactions XYZ and XYZQ match the entries in both the bypass list and the protect list; so the protect list entry takes precedence.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |