Close

Using CICS Security Discovery to simplify the implementation of role based command and resource security

(EL)

Stream: CICS
Time: 10:00 - 10:45


Presentation

For many years transaction security has been the main way of securing applications. In many cases users have been granted individual access to transactions, or are members of groups that are no longer required for their role. This session will present an end to end description of the workflow of CICS Security Discovery which is designed to solve that problem and help you identify the roles, command and resource definitions in your production regions. There will be a demo of the Security Discovery Explorer Editor which analyses your existing security definitions, and production usage to identify roles, the users in these roles and their access to applications and resources.

Attachments

There is currently no attachment for Using CICS Security Discovery to simplify the implementation of role based command and resource security

Speakers


  • John Taylor at IBM UK LTD.
  • Email: jtaylor1@uk.ibm.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!