ALERT: Some images may not load properly within the Knowledge Base Article. If you see a broken image, please right-click and select 'Open image in a new tab'. We apologize for this inconvenience.

Top Secret CICS Different Results EXEC CICS QUERY SECURITY calls

book

Article ID: 187004

calendar_today

Updated On:

Products

Top Secret

Issue/Introduction

debugging a CICS program that does EXEC CICS QUERY SECURITY calls, 

 

 

Environment

Release : 16.0

Component : CA Top Secret for z/OS

Resolution

There are normally two security checks when routing a transaction across a MRO link. There is a check for the link acid to see if the region can do the transaction and a check for the userid that issued the transaction (if attachsec=identify).  One can eliminate the link check by defining the regions as similar. Review the follow CICS doc for setting up your LINK security

https://techdocs.broadcom.com/content/broadcom/techdocs/us/en/ca-mainframe-software/security/ca-top-secret-for-z-os/16-0/auditing/setting-up-auditing-reporting-and-surveillance.html