Customizing to invoke other Z Data Tools components from ZDT/CICS

You can allow users to invoke Z Data Tools base function, or ZDT/Db2 or ZDT/IMS (if installed), from the ZDT/CICS primary option menu. To do this you customize your Z Data Tools base function security, using RACF® (or your equivalent security product), or HFMSECUR, to give the user IDs running ZDT/CICS a minimum of read access to the facility groups, FILEM.CICS.BASE, FILEM.CICS.IMS or FILEM.CICS.DB2, as appropriate. For information about these facility groups, see Controlling access or Controlling access. For more information about ZDT/IMS security, see Customizing the ZDT/IMS security environment.

If you provide this access then the ZDT/CICS primary option menu will include the functions HFM (for Z Data Tools base function), ZDT/IMS, and ZDT/Db2. These functions can then be invoked through the ZDT/CICS interface.

If you do not provide this access, then these functions will not appear on the menu, and will not be available.

Note: If you plan to run the Z Data Tools base function interface through the ZDT/CICS session, you must first complete the installation and customization of Z Data Tools base function as described in Customizing Z Data Tools. If you plan to run the ZDT/IMS interface through the ZDT/CICS session, you must first complete the installation and customization of ZDT/IMS as described in Customizing Z Data Tools IMS Component. If you plan to run the ZDT/Db2 interface through the ZDT/CICS session, you must first complete the installation and customization of ZDT/Db2 as described in Customizing Z Data Tools Db2 Component.