Customizing to invoke other Z Data Tools components from ZDT/CICS

You can allow users to invoke Z Data Tools Base function, or ZDT/Db2 or ZDT/IMS (if installed), from the ZDT/CICS primary option menu. To do this you customize your Z Data Tools Base function security, using RACF® (or your equivalent security product), or HFMSECUR to give the user IDs running ZDT/CICS a minimum of read access to the facility groups, FILEM.CICS.BASE, FILEM.CICS.IMS or FILEM.CICS.DB2, as appropriate. For information about these facility groups, see Controlling access. For more information about ZDT/IMS security, see Customizing the ZDT/IMS security environment.

If you provide this access then the ZDT/CICS primary option menu will include the functions HFM (for Z Data Tools Base function), ZDT/IMS, and ZDT/Db2. These functions can then be invoked through the ZDT/CICS interface.

If you do not provide this access, then these functions will not appear on the menu, and will not be available.

Note: If you plan to run the Z Data Tools Base function interface through the ZDT/CICS session, you must first complete the installation and customization of Z Data Tools Base functionas described in Customizing Z Data Tools. If you plan to run the ZDT/IMS interface through the ZDT/CICS session, you must first complete the installation and customization of ZDT/IMS as described in Customizing Z Data Tools IMS Component. If you plan to run the ZDT/Db2 interface through the ZDT/CICS session, you must first complete the installation and customization of ZDT/Db2 as described in Customizing Z Data Tools Db2 Component.