The CICSRequest node can use an identity that is present in the Properties folder of the message tree structure for the security credentials in a request, by using the Propagate property on the security profile that is defined on the node.
To propagate an identity to be used for the CICS request security credentials, complete the following steps.