Resource and command security in an intercommunication environment are
handled in much the same way as in a single-system environment.
CICS® performs resource and command security checking only if the installed
TRANSACTION definition specifies that they are required; for example, on the
CEDA DEFINE TRANSACTION command, as shown in Figure 1.
Figure 1. Specifying resource and command security
for transactions
If a transaction definition specifies resource security checking, using
RESSEC(YES), the link must have sufficient authority for the resources that
the attached transaction accesses.
If a transaction definition specifies command security checking, using
CMDSEC(YES), the link must have sufficient authority for the commands (COLLECT,
DISCARD, INQUIRE, PERFORM, and SET) that the attached transaction issues.