Transaction security

CICSĀ® transaction security prevents unauthorized users from running specific CICS transactions. Therefore, a user ID must have appropriate authority to run the transaction that executes the ZDT/CICS program. Also, ZDT/CICS will link to other CICS regions to process remote resources. This requires the user ID to have appropriate authority to run the mirror transaction that executes the ZDT/CICS program on the remote region.