How does Top Secret handle the CICS BYPASS list?

Document ID : KB000048470
Last Modified Date : 14/02/2018
Show Technical Document Details


When a transaction in this list and it is also permitted to a userid, which definition takes precedence, the BYPASS list or thepermit on the userid.


CA Top Secret will first check BYPASS list.

If on the list, the user will be granted access and no further security check will be done. This save CA Top Secret from doing a full security check which saves overhead and I/O.

If not on the list, a normal security check will be done to determine if the user has access to the CICS resource.