Close

CICS Security Discovery

(EL)

Stream: CICS
Time: 15:30 - 16:15


Presentation

For application running in CICS TS, transaction security has often been used. As a result users have been granted individual access to transactions which is no longer needed for their role. This session will present an end to end description of the workflow of CICS Security Discovery tooling which is designed to solve that problem and help you identify the roles, command and resource definitions in your production regions along with a to-do list. Live demo of the Security Discovery Explorer Editor to analyses existing security definitions, production usage to identify roles, the users in these roles and their access to applications and resources.

Attachments

There is currently no attachment for CICS Security Discovery

Speakers


  • John Taylor at IBM UK LTD.
  • Email: jtaylor1@uk.ibm.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!