RFS access security may be used to control access to execs and data.
This RFS control may be at the CICS level and/or RFS directory level. At the CICS level, authorization may be given to specific users, providing a high level of security.
At the RFS directory level, by default, only the owning user has access. The RFS AUTH command may be used to define a directory as public or secured. If secured, the RFS security exit is invoked to determine authorization.
Command execution security may be used to control use of specific REXX/CICS commands or command keywords.
Jump to Security Page 2, or Table of Contents.