This topic gives an overview of how security works when CICS® systems
are interconnected or connected to other compatible systems.
Introduction to intercommunication security
In a single CICS region, you can use security to make sure that
terminal users can access only those parts of the system they need to work
with. For interconnected systems, the same basic principles apply, but you
can also include definitions for connections, sessions, and partners. You
must also consider that users of one CICS region can initiate transactions
and access resources in another CICS region.