Command security

CICSĀ® command security allows CICS security checking to be performed on system programming commands. ZDT/CICS issues the following commands that are subject to command security checking when listing and processing CICS resources:
  • SET
Therefore, the user ID must have sufficient authority to issue the commands listed above to successfully perform the ZDT/CICS function.
Note: A user ID must have authority to issue the CICS INQUIRE command to run the ZDT/CICS interface.