O'Reilly logo

Architect's Guide to IBM CICS on System z by Thiago Rotta, Tommy Joergensen, Manuel Jaen, Steve Hobson, Ahmed Farrag, Phil Wakelin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security and auditing
In this chapter, we describe the business requirements for secure enterprise applications and how these can be addressed with the security and auditing capabilities provided by CICS. We describe capabilities that allow us to protect against the following items:
Access from clients who are not authenticated
Non authorized access to CICS resources
Exposure of confidential data
We describe the value of running applications inside CICS, taking advantage of the security capabilities provided by the System z architecture.
In ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required