Command security

CICS® command security allows CICS® security checking to be performed on system programming commands. ZDT/CICS issues the following commands that are subject to command security checking when listing and processing CICS® resources:
  • INQUIRE
  • SET
Therefore, the user ID must have sufficient authority to issue the commands listed above to successfully perform the ZDT/CICS function.
Note: A user ID must have authority to issue the CICS® INQUIRE command to run the ZDT/CICS interface.