Previous Topic Next topic Print topic


About User Impersonation

User impersonation functionality allows you to configure the environment's hosting account to either the default user account, or to the session's CICS signed on user account. The signed on user account is controlled using EXEC CICS SIGNON and EXEC CICS SIGNOFF.

Applications host under the account that started the session by default. User impersonation allows you to avoid the following situations:

The user impersonation that you configure applies to a session, which is generally equivalent to a terminal connection, ISC conversation, or MFBINP conversation.

Previous Topic Next topic Print topic