The CICS® region
user ID is used for authorization checking when the CICS system (rather than
an individual user of the system) requests access to a resource. CICS uses
the region user ID when checking authorization for these resources:
- MVS™ system
log streams
- For more information, see Authorizing access to MVS log streams.
- CICS system data sets
- For more information, see Authorizing access to CICS data sets.
- CICS user data sets
- For more information, see Authorizing access to user data sets.
- Temporary storage data sharing servers
- For more information, see Authorizing access to temporary storage servers.
- The SMSVSAM server
- For more information, see Authorizing access to SMSVSAM servers.
- Named counter servers
- For more information, see Authorizing access to named counter pools and servers.
- The VTAM® ACB
- For more information, see Controlling the opening of a CICS region's VTAM ACB.
- JES spool data sets
- For more information see JES spool protection in a CICS environment.
- The CICS interregion program
- For more information, see Logon security checking with MRO.
- Coupling facility data tables
- For more information, see Security for coupling facility data tables.
- RACF® key
rings
- For more information, see Building a key ring manually.
The CICS region user ID is assigned to a CICS region at initialization,
and is the user ID that is associated with the job or started task. For more
information, see Specifying the CICS region userid.