The following comments apply to the sections in Part 7 of this book:
The only aspects of CICS® security processing covered are:
Invoking a user-written external security manager.
Writing a "good night" transaction.
Customization of password expiry templates for HTTP basic authentication,
which is an element of CICS Web support, is covered in the CICS Internet Guide. For a comprehensive view of security
processing using the Resource Access Control Facility (RACF®) product, see the CICS RACF Security Guide.
Upon return from any customer-written program, CICS must always receive control in primary-space
translation mode, with the original contents of all access registers restored,
and with all general-purpose registers restored (except for those which provide
return codes or linkage information).
For information about translation
modes, refer to the IBM® ESA/370 Principles of Operation manual.