Mainframe Express Administrator's Guide
Table of Contents
Index
Chapter 8: Configuring CICS for Security
8.1 Overview
8.2 Transaction Security
8.3 Resource Security
8.4 Sign-on Table (SNT) Entries
8.4.1 The User SYSAD
8.5 Password Encryption and Decryption
8.5.1 The Interface to the Password Module
8.5.2 Choosing an Encryption and Decryption Scheme
8.5.3 Replacing the Password Encryption and Decryption Scheme