CICS users
When CICS security
is active, requests to attach transactions, and requests by transactions to
access resources, are associated with a user. When a user makes
a request, CICS calls the external security manager to determine if the user
has the authority to make the request. If the user does not have the correct
authority, CICS denies the request.