Protecting access to a CICS Region with ACF2
search cancel

Protecting access to a CICS Region with ACF2

book

Article ID: 273616

calendar_today

Updated On:

Products

ACF2 - z/OS ACF2 ACF2 - MISC

Issue/Introduction

What is the standard way to protect access to a CICS region in ACF2?

 

Environment

Release : 16.0

Resolution

The method for protecting access to a CICS region in ACF2 will depend on whether or not the ACF2/CICS interface is being used.

If using the ACF2/CICS interface, then access to a CICS region is determined by the SIGNON AUTH parameter in the interface and a bit field in the logonid record. More details and instructions for this are provided in Preinstallation Considerations under the section Define Additional CICS System Entry Authorization.

If not using the ACF2/CICS interface, then a MUSID needs to be specified on the region logonid and a bit field defined on the logonid record. More details and instructions for this are provided in Restrict Access to MUSASSes.

Note that the links provided require logging in with a Broadcom Support id.