Table 16 shows the CICS® application programming interface commands and options that are changed.
Command | Options | Comments |
---|---|---|
|
See Changes to EXEC CICS VERIFY PASSWORD. |
When you issue the EXEC CICS VERIFY PASSWORD command, CICS now enforces the revoked status of a user ID or a user's group connection. The new method CICS uses to verify the password is more efficient, but you might notice changes to the output that is produced when verification takes place.
CICS now attempts to verify a password using a RACROUTE REQUEST=EXTRACT request to the external security manager. If the password cannot be verified using this method, CICS uses a RACROUTE REQUEST=VERIFYX call. Before CICS TS for z/OS®, Version 3.1, CICS always used the RACROUTE REQUEST=VERIFYX call, which is more expensive.
There are some differences in the output produced by the external security manager for the old and new methods of verifying a password. If your application programs relied on the output produced by the old method, you need to change them so that they do not depend on this output. The differences are: