Activating security in CICS and IMS

Document ID : KB000074478
Last Modified Date : 21/03/2018
Show Technical Document Details
Introduction:
Activating security in CICS and IMS.
Question:
An application not authorized for anything resource is not getting any security violations. The application runs in CICS and accesses information in IMS.
Answer:
SECTRACE shows now security checks.

Need to activate CICS security and IMS security.

The following links documents  how to setup security in CICS. Here is the main topic that discusses setting up CICS.

https://docops.ca.com/ca-top-secret-for-z-os/16-0/en/implementing-in-cics-and-other-interfaces

Here is the section that is specific to security stuff in CICS: https://docops.ca.com/ca-top-secret-for-z-os/16-0/en/implementing-in-cics-and-other-interfaces/implementing-security-in-cics/implementing-the-security-in-cics/resource-validation-and-auditing

https://docops.ca.com/ca-top-secret-for-z-os/16-0/en/implementing-in-cics-and-other-interfaces/implementing-security-in-cics/implementing-the-security-in-cics/administering-transaction-security

https://docops.ca.com/ca-top-secret-for-z-os/16-0/en/implementing-in-cics-and-other-interfaces/implementing-security-in-cics/implementing-the-security-in-cics/administering-resource-level-security

Here is a section that talks about IMS:
https://docops.ca.com/ca-top-secret-for-z-os/16-0/en/implementing-in-cics-and-other-interfaces/implementing-security-for-ims