Security


REXX/CICS often viewed as a "sophisticated" CECI (CICS Enhanced Command Interpreter) and REXX/CICS transactions can be controlled with transaction security and resource security.

RFS access security may be used to control access to execs and data.

This RFS control may be at the CICS level and/or RFS directory level. At the CICS level, authorization may be given to specific users, providing a high level of security.

At the RFS directory level, by default, only the owning user has access. The RFS AUTH command may be used to define a directory as public or secured. If secured, the RFS security exit is invoked to determine authorization.

Command execution security may be used to control use of specific REXX/CICS commands or command keywords.

Jump to Security Page 2, or Table of Contents.


sfw@nersp.cns.ufl.edu
               (9)