CICS Transaction Server for z/OS® RACF
Security Guide
The RACF Security Guide explains how to use RACF to provide security
for CICS. It contains information for security administrators and system programmers.
Introduction to CICS security with RACF
This part is an introduction to CICS® security. It explains at a high level
how you can use the facilities provided by RACF® to make your CICS systems, and the resources in those
systems, secure against unauthorized access.
Intercommunication security
This part tells you how to plan and implement security in an intersystem
communication (ISC) environment, using LU6.2 or LU6.1, or in a multiregion
operation (MRO) environment.
Security for TCP/IP clients
This part discusses how you can secure your applications when CICS participates
in a client-server configuration, using TCP/IP communication protocols.
Customization
This part tells you how to customize the interface between CICS and
the External Security Manager.
Problem determination
This part explains how to determine the cause of security-related
problems in CICS.
CICSPlex SM security
This part describes how to implement security for CICSPlex® SM.