How does CA Top Secret handle the CICS BYPASS list?

book

Article ID: 32780

calendar_today

Updated On:

Products

CA Top Secret CA Top Secret - LDAP

Issue/Introduction

Question:
 
When a transaction in the BYPASS list and it is also permitted to a userid, which definition takes precedence, the BYPASS list or the permit on the userid?
 
 
Answer:
 
CA Top Secret will first check BYPASS list.

If on the list, the user will be granted access and no further security check will be done. This saves CA Top Secret from doing a full security check which saves overhead and I/O.

If not on the list, a normal security check will be done to determine if the user has access to the CICS resource.

 

Additional Information:

 

CA Top Secret Implementation: CICS Guide

https://support.ca.com/cadocs/0/CA%20Top%20Secret%20%20Security%20for%20z%20OS%20r15-ENU/Bookshelf_Files/HTML/TSS_CICS_zOS_ENU/index.htm

 

 

 

Environment

Release: TOPSEC00200-15-Top Secret-Security
Component: