Posted by: Service management team <smt...@xs4all.nl>
we're setting up a SQLHost/DB2 for CICS environment using TCP/IP and
wonder how the verification requests are done from the listener program
It seems there is some security checking for the userid and the
There is nothing in the documentation about this security checking.
We also wonder why we need an exit (EZACICSE) for the security checking
when this function is supported from the GTILSN program?
Hope someone can help us,
Thanks in advance, Paul Jansen