If on the list, the user will be granted access and no further security check will be done. This saves CA Top Secret from doing a full security check which saves overhead and I/O.
If not on the list, a normal security check will be done to determine if the user has access to the CICS resource.
CA Top Secret Implementation: CICS Guide
Was this information helpful?