Implementing MRO security
This topic tells you how to implement CICS® multiregion operation (MRO) security.
Security implications of choice of MRO access method
Bind-time security with MRO
Logon security checking with MRO
Link security with MRO
Specifying link security for MRO connections
User security with MRO
Transaction, resource, and command security with MRO
Transaction routing security with MRO
Function shipping security with MRO
Distributed program link security with MRO
Security checking done in AOR with MRO
Parent topic:
Intercommunication security