Transaction security
CICS® transaction security prevents unauthorized users from running specific CICS® transactions. Therefore, a user ID must have appropriate authority to run the transaction that executes the FM/CICS program. Also, FM/CICS will link to other CICS® regions to process remote resources. This requires the user ID to have appropriate authority to run the mirror transaction that executes the FM/CICS program on the remote region.