The level of user security you require for a remote system is specified
in the ATTACHSEC operand in the CONNECTION definition, as shown in Figure 1.
This topic describes how CICS
interprets the parameters of the ATTACHSEC operand of the CONNECTION definition.
However, special rules apply for CICS transaction routing, as described in Transaction routing security with LU6.2. Figure 1 shows an example of defining ATTACHSEC
using CEDA.
Figure 1. Defining sign-on level for user security
Note: For APPC terminals defined as a TERMINAL-TYPETERM pair,
the ATTACHSEC operand is on the TERMINAL definition.
The ATTACHSEC operand specifies the sign-on requirements for incoming transaction
attach requests. It has no effect on attach requests that are issued by your
system to a remote system; these are dealt with in the remote system.
When an APPC session is bound, each side tells the other the level of attach
security user verification that will be performed on its incoming requests.
There is no negotiation on this.