CICS security considerations for ZDT/CICS

To provide the necessary security for your CICS® regions, CICS uses the z/OS® system authorization facility (SAF) to route authorization requests to an external security manager (ESM), such as RACF®, at appropriate points within CICS transaction processing. ZDT/CICS does not use any undocumented or unsupported interfaces that bypass CICS security. Therefore, CICS security can be utilized to protect your system from unauthorized access to CICS resources through ZDT/CICS.

When CICS Security prevents successful execution of a ZDT/CICS function, a NOTAUTH response is displayed. To ensure proper authorization to CICS resources through ZDT/CICS, consider the following aspects of CICS Security in your environment: