Security
CICS® Configuration Manager introduces these security issues:
- Authorizing the CICS region user ID (of the region running the CICS Configuration Manager server) to access all of the CSD files in your environment.
- Authenticating the user when a CICS Configuration Manager client communicates with the server.
- Restricting user access to API commands and resource definitions.
CICS Configuration Manager uses MVS™ system authorization facility (SAF) callable services for security checking. This allows you to use a SAF-enabled external security manager (ESM), such as RACF®, CA ACF2 or CA Top Secret, to administer CICS Configuration Manager security. The examples presented here are for RACF. For details on using other ESMs, see the documentation for those products.