When a transaction in this list and it is also permitted to a userid, which definition takes precedence, the BYPASS list or thepermit on the userid.
CA Top Secret will first check BYPASS list.
If on the list, the user will be granted access and no further security check will be done. This save CA Top Secret from doing a full security check which saves overhead and I/O.
If not on the list, a normal security check will be done to determine if the user has access to the CICS resource.