CICS® security considerations for FM/CICS

To provide the necessary security for your CICS® regions, CICS® uses the z/OS® system authorization facility (SAF) to route authorization requests to an external security manager (ESM), such as RACF®, at appropriate points within CICS® transaction processing. FM/CICS does not use any undocumented or unsupported interfaces that bypass CICS® security. Therefore, CICS® security can be utilized to protect your system from unauthorized access to CICS® resources through FM/CICS.

When CICS® Security prevents successful execution of an FM/CICS function, a NOTAUTH response is displayed. To ensure proper authorization to CICS® resources through FM/CICS, consider the following aspects of CICS® Security in your environment: