cics ts for z/os: configuring cics - ibm · 2020-03-05 · cics transaction server resource usage...

530
CICS Transaction Server for z/OS Version 5 Release 5 Configuring CICS IBM

Upload: others

Post on 13-Apr-2020

28 views

Category:

Documents


0 download

TRANSCRIPT

  • CICS Transaction Server for z/OSVersion 5 Release 5

    Configuring CICS

    IBM

  • Note

    Before using this information and the product it supports, read the information in “Notices” on page497.

    This edition applies to the IBM® CICS® Transaction Server for z/OS® Version 5 Release 5 (product number 5655-Y04) andto all subsequent releases and modifications until otherwise indicated in new editions.© Copyright International Business Machines Corporation 1974, 2020.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract withIBM Corp.

  • Contents

    About this PDF......................................................................................................xi

    Chapter 1. CICS topology.......................................................................................1The roles of a CICS region in a CICSplex.....................................................................................................4

    Chapter 2. CICS resources..................................................................................... 5How you can define CICS resources............................................................................................................5Commands for managing resources......................................................................................................... 10Shared resources for intercommunication............................................................................................... 12Security of resource definitions.................................................................................................................13

    Auditing resources............................................................................................................................... 14

    Chapter 3. Setting up shared data sets, CSD and SYSIN........................................21Planning your CSD configuration...............................................................................................................21Calculating CSD disk space....................................................................................................................... 22Initializing the CSD.....................................................................................................................................23

    Creating a larger CSD........................................................................................................................... 25Defining CSD attributes............................................................................................................................. 25Shared user access from the same CICS region.......................................................................................26

    Sharing user access from several CICS regions.................................................................................. 26Multiple users of the CSD within a CICS region (non-RLS).......................................................................27Sharing a CSD by CICS regions within a single MVS image (non-RLS)..................................................... 27Sharing a CSD in a multi-MVS environment (non-RLS).............................................................................28Multiple users of one CSD across CICS or batch regions (non-RLS)........................................................ 28Sharing the CSD between different releases of CICS............................................................................... 29

    Sharing the CSD between CICS regions that use Db2.........................................................................29CICS-supplied compatibility groups....................................................................................................30

    Other factors restricting CSD access.........................................................................................................30Differences in CSD management between RLS and non-RLS access...................................................... 30

    Specifying read integrity for the CSD................................................................................................... 31Specifying file control attributes for the CSD............................................................................................31Effect of RLS on the CSD batch utility DFHCSDUP....................................................................................32Planning for backup and recovery.............................................................................................................32

    Transaction backout during emergency restart.................................................................................. 34Dynamic backout for transactions....................................................................................................... 35

    Other recovery considerations.................................................................................................................. 35CEDA command syncpoint criteria...................................................................................................... 35Accessing the CSD by the offline utility program, DFHCSDUP............................................................35

    Logging RDO commands............................................................................................................................36Logging SPI commands............................................................................................................................. 37Making the CSD available to CICS............................................................................................................. 38

    Installing the RDO transactions...........................................................................................................39Installing definitions for the Japanese language feature................................................................... 39

    Chapter 4. Setting up a CICS region......................................................................41Defining data sets...................................................................................................................................... 41

    Setting up CICS data sets.....................................................................................................................41Setting up temporary storage data sets.............................................................................................. 48Setting up data sets for transient data................................................................................................ 50Setting up CICS log streams................................................................................................................ 54

    iii

  • Setting up the catalog data sets.......................................................................................................... 65Setting up auxiliary trace data sets..................................................................................................... 75Defining dump data sets...................................................................................................................... 76Defining user files.................................................................................................................................80Defining the CDBM GROUP command data set...................................................................................91Defining the CMAC messages data set................................................................................................ 93Defining the WS-AT data set................................................................................................................ 94Setting up the debugging profiles data sets........................................................................................ 95Encrypting data sets.............................................................................................................................99

    Specifying CICS system initialization parameters..................................................................................102System initialization parameters to set up a CICS region.................................................................103Specifying DFHSIT macro parameters.............................................................................................. 108The default system initialization table.............................................................................................. 111Assembling the SIT............................................................................................................................ 119Selecting versions of CICS programs and tables.............................................................................. 120

    Processing system initialization parameters.......................................................................................... 121Supplying system initialization parameters to CICS.........................................................................121Using system initialization control keywords....................................................................................122Controlling start and restart...............................................................................................................125

    Retrieving information about system initialization parameters used at system startup...................... 132Specifying feature toggles.......................................................................................................................133

    Setting up a region-level configuration file....................................................................................... 135Setting up group-level configuration files......................................................................................... 135

    CICS startup.............................................................................................................................................136Setting address space storage limits for a CICS region....................................................................138Using the sample startup job stream................................................................................................ 139A sample CICS startup procedure..................................................................................................... 147

    Preparing CICS for using debugging tools.............................................................................................. 148Preparing your CICS region for debugging........................................................................................ 148

    Starting CICS regions...............................................................................................................................149Specifying system initialization parameters before startup............................................................. 150Starting CICS as a batch job.............................................................................................................. 151Starting CICS as a started task.......................................................................................................... 152Overriding system initialization parameters during startup............................................................. 153System console messages for CICS startup..................................................................................... 154CICS Transaction Server resource usage collection for software pricing........................................ 158

    Chapter 5. Setting up CICS data sharing servers................................................. 159Defining and starting AXM system services............................................................................................159Setting up and running a temporary storage server............................................................................... 160

    Overview of the temporary storage data sharing server...................................................................160Defining temporary storage pools for temporary storage data sharing........................................... 162Defining TS server regions................................................................................................................. 164Queue server automatic ALTER processing...................................................................................... 170Shared TS queue server commands..................................................................................................170Unloading and reloading queue pools...............................................................................................172

    Setting up and running a coupling facility data table server.................................................................. 174Overview of a coupling facility data table server.............................................................................. 174Coupling facility data tables.............................................................................................................. 176Defining and starting a coupling facility data table server region.................................................... 180Controlling coupling facility data table server regions......................................................................190Deleting or emptying coupling facility data table pools....................................................................195Unloading and reloading coupling facility data table pools..............................................................195

    Setting up and running a region status server........................................................................................ 197Defining a list structure......................................................................................................................198Starting a region status server...........................................................................................................200Controlling region status servers.......................................................................................................201

    iv

  • Deleting region status server pools................................................................................................... 207Setting up and running a named counter server.................................................................................... 207

    Named counter server overview........................................................................................................208Defining a named counter options table........................................................................................... 210Defining a list structure for a named counter server........................................................................ 213Defining and starting a named counter server region.......................................................................214Controlling named counter server regions........................................................................................ 218Deleting or emptying named counter pools...................................................................................... 221Changing the size of named counter pools....................................................................................... 221Unloading and reloading named counter pools................................................................................ 221Dumping named counter pool list structures....................................................................................223

    Coupling facility server operations..........................................................................................................223Monitoring coupling facility server messages................................................................................... 223Coupling facility storage management..............................................................................................224Managing the pool structure..............................................................................................................226Server connection management........................................................................................................227

    CICS server support for system-managed processes............................................................................229System-managed list structure rebuild.............................................................................................229System-managed list structure duplexing........................................................................................ 231

    Chapter 6. Defining resources............................................................................ 233The resource definition batch utility DFHCSDUP....................................................................................233

    Sharing the CSD between CICS Transaction Server for z/OS, Version 5 Release 5 and earlierreleases......................................................................................................................................... 234

    Sample job for invoking DFHCSDUP as a batch program..................................................................234Command processing in DFHCSDUP following internal error detection..........................................236

    Autoinstall................................................................................................................................................237Autoinstall models...................................................................................................................................237Autoinstall control program.................................................................................................................... 237Autoinstalling z/OS Communications Server terminals......................................................................... 237

    Deciding which terminals to autoinstall............................................................................................ 238Autoinstall and z/OS Communications Server.................................................................................. 239Implementing z/OS Communications Server autoinstall..................................................................243Recovery and restart of autoinstalled terminal definitions.............................................................. 245

    Autoinstalling MVS consoles................................................................................................................... 250Implementing autoinstall for MVS consoles..................................................................................... 251The autoinstall control program for MVS consoles........................................................................... 252

    Autoinstalling APPC connections............................................................................................................253Implementing APPC connection autoinstall..................................................................................... 254Model definitions for connection autoinstall.....................................................................................254The autoinstall control program for connections..............................................................................255Recovery and restart for connection autoinstall...............................................................................255

    Autoinstalling IPIC connections..............................................................................................................256Autoinstalling programs, map sets, and partition sets...........................................................................256

    Implementing program autoinstall....................................................................................................256Cataloging for program autoinstall.................................................................................................... 257Model definitions for program autoinstall......................................................................................... 258The autoinstall control program for programs.................................................................................. 258Program autoinstall and recovery and restart...................................................................................259

    Autoinstalling model terminal definitions...............................................................................................259Autoinstalling journals.............................................................................................................................260Macro resource definition........................................................................................................................260

    Introduction to CICS control tables and macros.............................................................................. 260Defining resources in CICS control tables.........................................................................................269

    Defining CICS bundles.............................................................................................................................273Artifacts that can be deployed in bundles.........................................................................................274Characteristics of resources in CICS bundles................................................................................... 279

    v

  • Referencing zFS artifacts in a bundle................................................................................................ 286Private resources for application versions........................................................................................ 287Manifest contents for a CICS bundle.................................................................................................293Scoping of bundles.............................................................................................................................296OSGi bundle recovery on a CICS restart............................................................................................298Security for bundles........................................................................................................................... 299Variables in a CICS project.................................................................................................................301Variables and properties files definition............................................................................................302

    Defining terminal resources.................................................................................................................... 304Defining z/OS Communications Server terminals............................................................................. 304Defining sequential (BSAM) devices..................................................................................................306Defining console devices................................................................................................................... 308Defining z/OS Communications Server persistent sessions support............................................... 310

    Resource definition installation.............................................................................................................. 312What happens when CICS is initialized............................................................................................. 312What happens when you use the INSTALL command...................................................................... 312How to install a limited number of data definitions.......................................................................... 313Duplicate resource definition names.................................................................................................313

    Installing ATOMSERVICE resource definitions.......................................................................................314Installing connection definitions.............................................................................................................315Installing Db2 connection definitions..................................................................................................... 315

    Checks on definitions of Db2 connection resources.........................................................................316Installing Db2 entry definitions...............................................................................................................316

    Checks on definitions of Db2 entry resources.................................................................................. 317Installing Db2 transaction definitions.....................................................................................................317

    Checks on definitions of Db2 transaction resources........................................................................ 317Installing enqueue model definitions..................................................................................................... 318Installing file definitions..........................................................................................................................318Installing IPCONN definitions................................................................................................................. 318Installing a LIBRARY resource definition by using CEDA.......................................................................319Installing partner definitions...................................................................................................................319Installing sessions definitions.................................................................................................................320Installing transient data queue definitions.............................................................................................320Replacing existing transient data queue definitions.............................................................................. 320Disabling transient data queues..............................................................................................................321Installing terminal definitions................................................................................................................. 321

    Checking terminal definitions............................................................................................................ 322Installing URIMAP resource definitions..................................................................................................322Installing WEBSERVICE resource definitions......................................................................................... 323

    Chapter 7. Setting up a platform........................................................................ 325Designing a CICS platform.......................................................................................................................326Preparing zFS for platforms.....................................................................................................................329Creating a platform..................................................................................................................................331Deploying a platform............................................................................................................................... 332

    Chapter 8. Setting up CMCI................................................................................ 335Setting up CMCI with CICSPlex SM.........................................................................................................335

    Configuring CMCI in a WUI region..................................................................................................... 336Configuring a WUI region to use the CMCI JVM server.....................................................................340Setting up for multiple CMCI JVM servers in a CICSplex..................................................................344Configuration parameter mapping between CICSPlex SM WUI server and CMCI JVM server........344Record count warnings in CMCI.........................................................................................................347Estimating storage requirements for CMCI.......................................................................................352Defining a client whitelist to CMCI JVM server................................................................................. 353

    Setting up CMCI in a stand-alone CICS region....................................................................................... 355Configuring security for CMCI in a stand-alone CICS region............................................................ 357

    vi

  • Chapter 9. Configuring shared data tables..........................................................359Planning to use data tables..................................................................................................................... 359

    Performance of a CICS-maintained data table................................................................................. 359Performance of a user-maintained data table.................................................................................. 359Storage use for shared data tables....................................................................................................359MVS JCL requirements when using shared data tables....................................................................361Selecting files for use as data tables................................................................................................. 361Using statistics to select data tables.................................................................................................362Security checking for data tables...................................................................................................... 365Preparing to use shared data tables support.................................................................................... 366

    Resource definition for data tables.........................................................................................................367Resource definition for CICS-maintained data tables...................................................................... 367Resource definition for user-maintained data tables....................................................................... 368The DEFINE FILE command defines data tables........................................................................... 369EXEC CICS commands for data tables.............................................................................................. 372CEMT commands for data tables.......................................................................................................373

    Chapter 10. Setting up event processing.............................................................375

    Chapter 11. Configuring the Link3270 bridge......................................................377Defining Link3270 system initialization parameters..............................................................................377Defining the bridge facility ......................................................................................................................377

    Defining the facility............................................................................................................................ 377Defining the bridge facility name.......................................................................................................378Defining a specific bridge facility name.............................................................................................380Initializing the TCTUA........................................................................................................................ 380Accessing bridge facility properties.................................................................................................. 380

    Chapter 12. Configuring EXCI.............................................................................385Setting up EXCI for static routing............................................................................................................385Setting up EXCI for dynamic routing....................................................................................................... 385Defining connections to CICS..................................................................................................................386

    CONNECTION resource definition for EXCI.......................................................................................386SESSIONS resource definitions for EXCI connections......................................................................387Inquiring on the state of EXCI connections.......................................................................................389

    The EXCI user-replaceable module........................................................................................................ 390Using the EXCI options table, DFHXCOPT.............................................................................................. 391

    Chapter 13. Setting up CICS ONC RPC ............................................................... 397CICS ONC RPC setup tasks......................................................................................................................398

    Creating the CICS ONC RCP data set.................................................................................................398JCL entry for dump formatting...........................................................................................................398Migrating between CICS versions......................................................................................................398Modifying z/OS Communications Server data sets........................................................................... 398

    Defining CICS ONC RPC resources to CICS............................................................................................ 399Transaction definitions for CICS ONC RPC transactions.................................................................. 399Transaction definitions for extra alias transactions..........................................................................399Program definitions for CICS ONC RPC programs.............................................................................399Program definitions for user-written programs................................................................................ 400Mapset definition............................................................................................................................... 401Transient data definitions.................................................................................................................. 401XLT definitions....................................................................................................................................401

    Chapter 14. Configuring CICS ONC RPC using the connection manager................403Starting the connection manager............................................................................................................403

    vii

  • Using the connection manager BMS panels......................................................................................404Starting the connection manager when CICS ONC RPC is disabled.................................................405Starting the connection manager when CICS ONC RPC is enabled................................................. 405

    Updating CICS ONC RPC status.............................................................................................................. 406Changing the CICS ONC RPC status.................................................................................................. 406

    Enabling CICS ONC RPC.......................................................................................................................... 407Setting and modifying options........................................................................................................... 407Validating, saving, and activating options......................................................................................... 409When CICS ONC RPC is enabled........................................................................................................409

    Defining, saving, modifying, and deleting 4-tuples................................................................................ 409Defining the attributes of a 4-tuple................................................................................................... 410Saving new 4-tuple definitions.......................................................................................................... 413Modifying existing 4-tuple definitions............................................................................................... 414Deleting existing 4-tuple definitions................................................................................................. 414

    Registering the 4-tuples..........................................................................................................................414Limits on registration......................................................................................................................... 414

    Unregistering 4-tuples.............................................................................................................................415Unregistering 4-tuples one by one.................................................................................................... 415Unregistering 4-tuples from a list......................................................................................................416

    Disabling CICS ONC RPC......................................................................................................................... 417On CICS normal shutdown.................................................................................................................417On CICS immediate shutdown...........................................................................................................418

    Updating the CICS ONC RPC data set..................................................................................................... 418Updating the CICS ONC RPC definition record..................................................................................419Working with a list of 4-tuples...........................................................................................................420Changing the attributes of a 4-tuple..................................................................................................421

    Processing the alias list........................................................................................................................... 422

    Chapter 15. Configuring for recovery and restart................................................ 425Logging and journaling.............................................................................................................................425

    Defining log streams to MVS.............................................................................................................. 426Defining replication log streams........................................................................................................426Defining system log streams..............................................................................................................426Defining forward recovery log streams..............................................................................................438Defining the log of logs.......................................................................................................................439Effect of daylight saving time changes.............................................................................................. 440

    Configuring for recovery of CICS-managed resources........................................................................... 442Recovering resources in the Liberty JVM server............................................................................... 442Recovery for transactions.................................................................................................................. 442Recovery for files................................................................................................................................444Recovery for intrapartition transient data......................................................................................... 449Recovery for extrapartition transient data........................................................................................ 452Recovery for temporary storage........................................................................................................ 453Recovery for web services................................................................................................................. 454Using a program error program (PEP)............................................................................................... 457

    Chapter 16. Configuring REXX............................................................................459Configuring REXX support....................................................................................................................... 459

    Create the RFS filepools.....................................................................................................................459Create resource definitions................................................................................................................459Review LSRPOOL definitions............................................................................................................. 460Update the CICSTART member......................................................................................................... 460Modify the CICS initialization JCL......................................................................................................461Format the RFS filepools....................................................................................................................462Verify the installation......................................................................................................................... 463Creating the help files........................................................................................................................ 464Configure the REXX Db2 interface.....................................................................................................464

    viii

  • REXX/CICS system definition and administration..................................................................................465Authorized REXX/CICS commands and authorized command options........................................... 465System profile exec............................................................................................................................465Authorized MVS PDS REXX libraries.................................................................................................. 465Defining authorized users.................................................................................................................. 466Setting system options...................................................................................................................... 466Defining a REXX file system (RFS) file pool....................................................................................... 466Creating a PLT entry for CICSTART....................................................................................................466Security exits......................................................................................................................................466

    Performance considerations................................................................................................................... 468Security.................................................................................................................................................... 468

    REXX/CICS supports multiple transaction identifiers.......................................................................468REXX/CICS file security......................................................................................................................468REXX/CICS command level security..................................................................................................468REXX/CICS authorized command support........................................................................................ 469Security definitions............................................................................................................................ 469

    Chapter 17. Checking CICS configuration with IBM Health Checker for z/OS....... 471CICS_CEDA_ACCESS............................................................................................................................... 471CICS_JOBSUB_SPOOL............................................................................................................................ 472CICS_JOBSUB_TDQINTRDR....................................................................................................................472

    Chapter 18. Migrating CICS to a Parallel Sysplex................................................ 473Benefits of implementing CICS in a Parallel Sysplex............................................................................. 473CICSplex, CICSPlex SM, and Parallel Sysplex........................................................................................ 474Parallel Sysplex principles...................................................................................................................... 475CICS functions and components that directly exploit Parallel Sysplex technology..............................478

    CICS log streams................................................................................................................................479CICS coupling facility data tables......................................................................................................481CICSPlex SM sysplex optimized workload management................................................................. 481XCF for MRO....................................................................................................................................... 481Use of temporary storage pools........................................................................................................ 482Named counters.................................................................................................................................483

    CICS functions and components that indirectly exploit Parallel Sysplex technology...........................485Db2 data sharing................................................................................................................................ 485IBM MQ shared queues......................................................................................................................486VSAM RLS........................................................................................................................................... 487Networking......................................................................................................................................... 488

    Other CICS functions and components that facilitate a Parallel Sysplex..............................................488Planning for migrating CICS to a Parallel Sysplex.................................................................................. 490

    Application affinities.......................................................................................................................... 490CICS workload routing and management......................................................................................... 492

    Notices..............................................................................................................497

    Index................................................................................................................ 503

    ix

  • x

  • About this PDF

    This PDF describes how you set up CICS TS for z/OS. Other PDFs, listed below, describe the configurationfor certain areas of CICS and you might need to refer to those as well as this PDF. (In IBM KnowledgeCenter, all this information is under one section called "Configuring".) You are also likely to need thereference companions to this PDF: the System Initialization Parameter Reference and the ResourceReference. Before CICS TS V5.4, the information in this PDF was in the System Definition Guide and theResource Definition Guide.

    Configuring information for areas of CICS is in the following PDFs:

    • SOAP and JSON is in Web Services Guide .• ONC/RPC interface is in the External Interfaces Guide .• EXCI is in Using EXCI with CICS.• Java and Liberty are in Java Applications in CICS.• Front End Programming Interface is in the Front End Programming Interface User's Guide.• Db2® is in Db2 Guide.• DBCTL is in the IMS DB Control Guide.• Shared data tables are in the Shared Data Tables Guide.• CICSPlex SM is in CICSPlex SM Administration.• BTS is in Business Transaction Services• Connections between CICS systems is in the Intercommunication Guide

    Reference information about the parameters used in CICS system initialization is in the SystemInitialization Parameter Reference.

    For details of the terms and notation used in this book, see Conventions and terminology used in the CICSdocumentation in IBM Knowledge Center.

    Date of this PDF

    This PDF was created on January 20th 2020.

    © Copyright IBM Corp. 1974, 2020 xi

    https://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/documentation/conventions.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/documentation/conventions.html

  • xii CICS TS for z/OS: Configuring CICS

  • Chapter 1. CICS topology

    © Copyright IBM Corp. 1974, 2020 1

  • You can distribute CICS applications and the resources they use between interconnected CICS regions.You can group CICS regions into CICS system groups and CICSplexes, and distribute regions across thez/OS systems in a sysplex.

    2 CICS TS for z/OS: Configuring CICS

  • CICSregion

    CICSregion

    CICSregion

    CICS system group

    CICS system group

    CICSplex

    CICSregion

    CICSregion

    z/OS system z/OS system

    CICSregion

    CICSregion

    CICS system group

    CICSplex

    CICSregion

    Figure 1. How CICS regions are organized in a sysplex

    Chapter 1. CICS topology 3

  • The following terms are used when discussing CICS topology:Sysplex

    A set of z/OS systems that communicate and cooperate with each other through multisystemhardware components and software services.

    CICS region

    An named instance of CICS Transaction Server that runs in its own z/OS address space. A CICS regioncan be started and stopped independently of other CICS regions.

    CICSplexA grouping of CICS regions that is managed as a single entity. Each CICS region can belong to oneCICSplex only. A CICSplex can include CICS regions running on different z/OS systems in a sysplex.

    CICS system groupA grouping of CICS regions in a CICSplex that can be managed as a single entity. A system group caninclude CICS regions running on different z/OS systems. In a CICSplex, each CICS region can belongto more than one system group, and system groups can be contained in other system groups.

    The roles of a CICS region in a CICSplexIn a CICSplex containing many CICS regions, it is convenient to assign regions to perform particular rolesfor the applications that they support.

    These roles are as follows:Transport-owning region

    A CICS region that connects a CICSplex to your communication network. Transaction requestsreceived by a transport-owning region are passed to an application-owning region for processing.

    Terminal-owning regionA CICS region that connects terminals and other devices, including printers, to the CICSplex.Transaction requests received by a terminal-owning region are passed to an application-owningregion for processing.

    Application-owning regionA CICS region that manages application programs. Requests for data are passed to a data-owningregion.

    Data-owning regionA CICS address space that manages access to files and databases.

    File-owning regionA CICS address space that manages access to files. A file-owning region is a specific type of data-owning region.

    All CICS regions can perform all the roles and, in some cases, it is appropriate to combine some of theroles in one region.

    4 CICS TS for z/OS: Configuring CICS

  • Chapter 2. CICS resourcesBefore you can run a program in CICS, you must supply CICS with information about system resources,including software resources such as programs and data, and hardware resources such as terminals orcommunications links. At a minimum, you must define a transaction.

    Every resource is defined with a set of attributes. The attributes are the properties of the resource, tellingCICS, for example, whether a file can be updated, what security level should be given to a transaction, orthe remote systems with which CICS can communicate.

    Resource definitions held on the CSD are organized into groups and lists. A group is a collection of relatedresources on the CSD. Each resource that you define must belong to a group; you cannot define aresource without naming the group. A list contains the names of groups that CICS installs at an initial orcold start. You can add groups to lists if you want them installed at an initial or cold start, or if it helps youto manage your groups better. Groups do not have to belong to lists, and can be defined independently.

    Where resources are held

    The CICS system definition (CSD) file is a VSAM data set that contains a resource definition record forevery resource that is defined to CICS through CEDA, CICS Explorer, or DFHCSDUP.

    You can change the contents of the CSD without interfering with a running CICS region that uses the CSD.When you install the definitions in the CICS region, CICS copies the information from the CSD and keeps itin its own storage. You can also change the definitions in the running region by reinstalling them, or addmore definitions by installing new resources. You can define the CSD file as recoverable, so that changesthat are incomplete when an abend occurs are backed out. You can also share a CSD file and its resourcedefinitions with different CICS regions, including regions at different releases. For information on definingthe CSD, see Setting up the CICS system definition data set.

    Resources that cannot be defined in the CSD are held in CICS control tables. The tables and their resourcedefinitions are created by using the CICS table assembly macro instructions. You have to code assembler-language macro statements for each resource to appear in the table, assemble the complete set of macrostatements, link-edit the output to produce a load module, and specify the module suffix in DFHSIT. SeeDefining resources in CICS control tables.

    How you can define CICS resourcesYou can define CICS resources using the CICS Explorer®, CICS bundles, CICSPlex® SM BusinessApplication Services, resource definition online (RDO), CICS system programming commands, theDFHCSDUP offline utility, autoinstall, or macro resource definition. Compare the relevant methods ofresource definition to choose which way to define each of your CICS resources.

    Resource definitions can be stored in the following repositories:

    • The CSD file for the CICS region• The CICSPlex SM data repository• zFS (the z/OS UNIX file system), for CICS bundles• Control tables in a program library, for macro resource definition

    Certain interfaces can be used to work with resource definitions in each of these repositories. Some CICSresource types are not supported by some interfaces and some repositories.

    You can use the following interfaces to define CICS resources:CICS Explorer

    You can use the CICS Explorer to define, install, and manage resources. If CICS Explorer is connectedto a CICS system, definitions are stored in the CICS system definition (CSD) file, and are installed intoan active CICS system from the CSD file. If CICS Explorer is connected to CICSPlex SM, definitions are

    © Copyright IBM Corp. 1974, 2020 5

    https://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/configuring/cics/dfha2_set_sysdef_dataset.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/configuring/resources/dfha4t5.html

  • stored in the CICSPlex SM data repository and can be installed either automatically, during CICSinitialization, or dynamically, into a running CICS system.

    BundlesYou can define and package resources in a CICS bundle using the CICS Explorer or IBM Developer forZ. CICS creates the resources dynamically when the bundle is deployed, and you manage theirlifecycle through the CICS bundle as a single unit in the CICS system. The CICS bundle can alsospecify any system resources that are required in the CICS regions where the bundle is deployed. Youcan deploy a CICS bundle individually to a CICS region as a standalone bundle, or you can use it aspart of an application bundle that is deployed to a platform, or you can deploy it directly to a platform.For information about CICS bundles, see Defining CICS bundles.

    CICSPlex SM Business Application ServicesYou can use CICSPlex SM Business Application Services (BAS) to define and manage resources.Definitions are stored in the CICSPlex SM data repository and can be installed either automatically,during CICS initialization, or dynamically, into a running CICS system. For information about CICSPlexSM BAS, see Administering BAS.

    Resource definition online (RDO)This method uses the supplied online transactions CEDA, CEDB, and CEDC, which allow you to define,alter, and install resources in a running CICS system. Definitions are stored in the CSD file, and areinstalled into an active CICS system from the CSD file. This method updates resources on the CSD file,which means you can define, alter, and install resources in a running CICS system. For informationabout RDO using the CEDA transaction, see Resource management transaction CEDA commands.

    System programming, using the EXEC CICS SPI commandsYou can use the EXEC CICS CREATE commands, and the EXEC CICS FEPI INSTALL commands forFEPI resources, to create resources independently of the CSD file. For further information, seeCreating resource definitions.

    System programming, using the EXEC CICS CSD commandsYou can use the EXEC CICS CSD commands to manage resource definitions in the CSD file from auser-written program. The EXEC CICS CSD commands can perform all the functions of CEDA exceptCEDA CHECK.

    DFHCSDUP offline utilityDFHCSDUP is an offline utility that allows you to define, list, and modify resources using a batch job.DFHCSDUP can be invoked as a batch program or from a user-written program running either in batchmode or under TSO. Using the second method, you can specify up to five user exit routines withinDFHCSDUP. You can use the DFHCSDUP utility to make changes to definitions in the CSD file. Thedefinitions are stored in the CSD file. For information about the DFHCSDUP utility, see Systemdefinition file utility program (DFHCSDUP).

    Automatic installation (autoinstall)Autoinstall minimizes the need for a large number of definitions, by dynamically creating newdefinitions based on a “model” definition provided by you. This applies to VTAM® terminals, LU6.2sessions, IPIC connections, journals, programs, mapsets, and partitionsets. You set up “model”definitions using either RDO or DFHCSDUP. CICS can then create and install new definitions for theseresources dynamically, based on the models.

    Macro definitionYou can use assembler macro source to define resources that cannot be stored on the CSD. Thedefinitions are stored in assembled control tables in a program library, from which they are installedduring CICS initialization.

    You must use macro instructions to define non-VTAM networks and terminals, non-VSAM files,databases, and resources for monitoring and system recovery. For information about CICS macros,see Macro resource definition.

    Which methods you use depends on the resources you want to define. Table 1 on page 7 suggestssome of the things you should consider when deciding which definition method to use. Table 2 on page8 shows you the methods you can use for each resource.

    6 CICS TS for z/OS: Configuring CICS

    https://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/configuring/resources/defining_app_resources.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/administering/cpsm/managing_resources.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_commands.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/system-programming/intro/dfha808.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/configuring/resources/dfhcsdup.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/configuring/resources/dfhcsdup.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/configuring/resources/dfha4_macros.html

  • Table 1. Methods of resource definition

    Method Advantages Disadvantages

    CICS Explorer • Intuitive and easy to use interface.• Integration point for other CICS tools.• Centralized resource definition.• Logical scoping.• Distributed resource installation.• Works with CICS bundles, BAS, and the

    CICS CSD.

    FEPI resources cannot be defined withCICS Explorer.

    Bundles • You can define some resource types inthe CICS bundle to be createddynamically when the bundle isdeployed.

    • You can specify other required resourcesthat must be present in the CICS region.

    • You can install, uninstall, enable, anddisable applications by operating on asingle resource.

    • Bundles provide versioning so that youcan manage resource and applicationupdates.

    • Some resources can only be defined anddeployed using bundles.

    • Non-CICS resources can be created andmanaged in CICS bundles alongside CICSresources.

    • You cannot modify or change the state ofresources defined in a bundle in thesame ways as individually definedresources.

    • Not all application resources aresupported by bundles.

    CICSPlex SM BAS • Centralized resource definition.• Logical scoping.• Distributed resource installation.

    Not all application resources are supportedby BAS.

    RDO RDO is used while CICS is running, soallows fast access to resource definitions.

    Because CEDA operates on an active CICSsystem, care should be taken if it is used ina production system. Use some form ofauditing as a control mechanism.

    EXEC CICS SPIcommands

    It enables configuration and installation ofCICS resources for large numbers of CICSregions from a single management focalpoint. It also allows you to writeapplications for administering the runningCICS system.

    CREATE commands neither refer to norrecord in the CSD file. The resultingdefinitions are lost on a cold start, and youcannot refer to them in a CEDA transaction.

    EXEC CICS CSDsystem commands

    • You can write applications customized toyour environment that can manage theCSD and installed resources.

    • Resources updated by this method canbe referred to by CEDA.

    • Supports compatibility mode for sharingCSDs with earlier releases of CICS.

    Requires more work to implement thansome other methods.

    Chapter 2. CICS resources 7

  • Table 1. Methods of resource definition (continued)

    Method Advantages Disadvantages

    DFHCSDUP • You can modify or define a large numberof resources in one job.

    • You can run DFHCSDUP against a non-recoverable CSD file while it is beingshared between CICS regions using RLSaccess mode.

    • You cannot install resources into anactive CICS system.

    • You cannot make updates via DFHCSDUPagainst a recoverable CSD file that isbeing accessed in RLS mode.

    Autoinstall If you have large numbers of resources,much time is needed to define them, and ifthey are not all subsequently used, storageis also wasted for their definitions. Usingautoinstall reduces this wasted time andstorage.

    You must spend some time initially settingup autoinstall in order to benefit from it.

    Macro • You can change the definitions containedin the tables while CICS is running, butyou must stop and restart CICS if youwant it to use the changed tables.

    • You must do time-consuming assembliesto generate macro tables.

    Table 2. Resources and how you can define them to the running CICS system

    Resource CICSExplorer

    CICSPlex SM BAS RDO, EXEC CICS SPI, andEXEC CICS CSDcommands

    Bundles DFHCSDUP Autoinstall Macro

    Atomdocuments

    Yes Yes (ATOMDEF) Yes (ATOMSERVICE) Yes Yes No No

    Bundles Yes Yes (BUNDDEF) Yes (BUNDLE) N/A Yes No No

    Connections Yes Yes (CONNDEF) Yes (CONNECTION) No Yes LU 6.2 only No

    Db2Connections

    Yes Yes (DB2CDEF) Yes (DB2CONN) No Yes No No

    Db2 entries Yes Yes (DB2EDEF) Yes (DB2ENTRY) No Yes No No

    Db2transactions

    Yes Yes (DB2TDEF) Yes (DB2TRAN) No Yes No No

    Documenttemplate

    Yes Yes (DOCDEF) Yes (DOCTEMPLATE) No Yes No No

    Enqueuemodels

    Yes Yes (ENQMDEF) Yes (ENQMODEL) No Yes No No

    Eventbindings andcapturespecifications

    Yes No No Yes No No No

    Eventprocessingadapter

    Yes No No Yes No No No

    Eventprocessingadapter set

    Yes No No Yes No No No

    FEPI nodelists

    No Yes (FENODDEF) Yes (NODELIST) No No No No

    FEPI pooldefinitions

    No Yes (FEPOODEF) Yes (POOL) No No No No

    FEPI propertysets

    No Yes (FEPRODEF) Yes (PROPERTYSET) No No No No

    8 CICS TS for z/OS: Configuring CICS

  • Table 2. Resources and how you can define them to the running CICS system (continued)

    Resource CICSExplorer

    CICSPlex SM BAS RDO, EXEC CICS SPI, andEXEC CICS CSDcommands

    Bundles DFHCSDUP Autoinstall Macro

    FEPI targetlists

    No Yes (FETRGDEF) Yes (TARGETLIST) No No No No

    Files (BDAM) No No No No No No Yes (DFHFCT)

    Files (VSAM) Yes Yes (FILEDEF) Yes (FILE) Yes Yes No No

    IPICconnections

    Yes Yes (IPCONDEF) Yes (IPCONN) No Yes Yes No

    Journals Yes Yes (JRNLDEF) No No No Yes No

    Journalmodels

    Yes Yes (JRNMDEF) Yes (JOURNALMODEL) No Yes No No

    LIBRARYresources

    Yes Yes (LIBDEF) Yes (LIBRARY) Yes Yes No No

    Local sharedresource(LSR) pools

    Yes Yes (LSRDEF) Yes (LSRPOOL) No Yes No No

    Map sets Yes Yes (MAPDEF) Yes (MAPSET) No Yes Yes No

    Node.jsapplications

    Yes No No Yes No No No

    OSGi bundlesand services

    Yes No No Yes No No No

    Package set Yes No No Yes No No No

    Partition sets Yes Yes (PRTNDEF) Yes (PARTITIONSET) No Yes Yes No

    Partners Yes Yes (PARTDEF) Yes (PARTNER) No Yes No No

    Pipelines Yes Yes (PIPEDEF) Yes (PIPELINE) No Yes No No

    Policy Yes No No Yes No No No

    Process types Yes Yes (PROCDEF) Yes (PROCESSTYPE) No Yes No No

    Profiles Yes Yes (PROFDEF) Yes (PROFILE) No Yes No No

    Programs Yes Yes (PROGDEF) Yes (PROGRAM) Yes Yes Yes No

    Recoverableserviceelements

    No No No No No No Yes (DFHRST)

    Sessions Yes Yes (SESSDEF) Yes (SESSIONS) No Yes No. No

    TCP/IPservices

    Yes Yes (TCPDEF) Yes (TCPIPSERVICE) No Yes No No

    Temporarystorage(defined bymacro)

    No No No No No No Yes (DFHTST)

    Temporarystoragemodels(resourcedefinition)

    Yes Yes (TSMDEF) Yes (TSMODEL) No Yes No No

    Terminals(non-VTAM)

    No No No No No No Yes (DFHTCT)

    Terminals(VTAM)

    Yes Yes (TERMDEF) Yes (TERMINAL) No Yes Yes No

    Transactions Yes Yes (TRANDEF) Yes (TRANSACTION) Yes Yes No No

    Transactionclasses

    Yes Yes (TRNCLDEF) Yes (TRANCLASS) No Yes No No

    Transient dataqueues

    Yes Yes (TDQDEF) Yes (TDQUEUE) No Yes No No

    Typeterms Yes Yes (TYPTMDEF) Yes (TYPETERM) No Yes No No

    Chapter 2. CICS resources 9

  • Table 2. Resources and how you can define them to the running CICS system (continued)

    Resource CICSExplorer

    CICSPlex SM BAS RDO, EXEC CICS SPI, andEXEC CICS CSDcommands

    Bundles DFHCSDUP Autoinstall Macro

    URI maps Yes Yes Yes (URIMAP) Yes Yes No No

    Web services Yes Yes Yes (WEBSERVICE) No Yes Yes No

    IBM MQconnection

    Yes Yes (MQCONDEF) Yes (MQCONN) No Yes No No

    XMLtransforms

    Yes No No Yes No No No

    Commands for managing resourcesYou manage your resource definitions using commands supplied as part of CEDA or DFHCSDUP. Thesecommands allow you to work with your resources, for example, by defining, deleting, copying, andrenaming.

    The commands are listed in Table 3 on page 10. For the syntax of these commands and information onhow to use them, see System definition file utility program (DFHCSDUP).

    Table 3. CEDA and DFHCSDUP commands

    Command Function CEDA DFHCSDUP

    ADD Adds a group name to a list. The CEDAADDcommand

    TheDFHCSDUPADDcommand

    ALTER Modifies the attributes of an existing resourcedefinition.

    The CEDAALTERcommand

    TheDFHCSDUPALTERcommand

    APPEND Copies a list to the end of another list. The CEDAAPPENDcommand

    CHECK (CEDA only) Cross checks the resource definitions within agroup, or within the groups in a list or lists, upto a maximum of four lists.

    The CEDACHECKcommand

    COPY Copies one or more resource definitions fromone group to another, or one resourcedefinition within a group.

    The CEDACOPYcommand

    TheDFHCSDUPCOPYcommand

    DEFINE Creates a new resource definition. The CEDADEFINEcommand

    TheDFHCSDUPDEFINEcommand

    DELETE Deletes one or more resource definitions. The CEDADELETEcommand

    TheDFHCSDUPDELETEcommand

    DISPLAY (CEDA only) Shows the names of one or more groups, lists,or resource definitions within a group.

    The CEDADISPLAYcommand

    10 CICS TS for z/OS: Configuring CICS

    https://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/configuring/resources/dfhcsdup.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_add.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_add.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_add.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/add.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/add.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/add.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/add.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_alter.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_alter.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_alter.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/alter.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/alter.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/alter.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/alter.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_append.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_append.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_append.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_check.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_check.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_check.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_copy.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_copy.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/dfha4_copy.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/copy.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/copy.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/copy.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/copy.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_define.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_define.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_define.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/define.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/define.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/define.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/define.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_delete.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_delete.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_delete.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/delete.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/delete.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/delete.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/delete.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_display.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_display.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_display.html

  • Table 3. CEDA and DFHCSDUP commands (continued)

    Command Function CEDA DFHCSDUP

    EXPAND (CEDA only) Shows the names of the resource definitionsin one or more groups or lists.

    The CEDAEXPANDcommand

    EXTRACT (DFHCSDUP only) Extracts and processes resource definitiondata from groups or lists on the CSD file.

    TheDFHCSDUPEXTRACTcommand

    INITIALIZE (DFHCSDUP only) Prepare a newly-defined data set for use as aCSD file.

    TheDFHCSDUPINITIALIZEcommand

    INSTALL (CEDA only) Dynamically adds a resource definition or agroup of resource definitions to the activeCICS system.

    The CEDAINSTALLcommand

    LIST (DFHCSDUP only) Produce listings of the current status of theCSD file.

    TheDFHCSDUPLISTcommand

    LOCK (CEDA only) Prevents other operators updating or deletinga group or the groups in a list.

    MOVE (CEDA only) Moves one or more resource definitions fromone group to another.

    The CEDAMOVEcommand

    PROCESS (DFHCSDUP only) Applies maintenance to the CSD file for aspecific APAR.

    TheDFHCSDUPPROCESScommand

    REMOVE Removes a group name from a list. The CEDAREMOVEcommand

    TheDFHCSDUPREMOVEcommand

    RENAME (CEDA only) Renames a resource definition, either within agroup, or while simultaneously moving it toanother group.

    The CEDARENAMEcommand

    SCAN (DFHCSDUP only) Scans all of the supplied groups and user-defined groups for a resource. The definitionof the matched resource in an supplied groupis compared to the definition(s) of thecorresponding matched resource in the usergroups.

    TheDFHCSDUPSCANcommand

    SERVICE (DFHCSDUP only) Applies corrective maintenance to the CSDfile.

    TheDFHCSDUPSERVICEcommand

    UNLOCK (CEDA only) Releases a lock on a group or list.

    Chapter 2. CICS resources 11

    https://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_expand.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_expand.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_expand.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/extract.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/extract.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/extract.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/extract.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/initialize.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/initialize.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/initialize.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/initialize.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_install.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_install.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_install.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/list.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/list.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/list.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/list.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_move.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_move.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_move.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/process.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/process.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/process.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/process.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_remove.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_remove.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_remove.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/remove.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/remove.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/remove.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/remove.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_rename.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_rename.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_rename.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/scan.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/scan.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/scan.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/scan.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/service.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/service.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/service.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/service.html

  • Table 3. CEDA and DFHCSDUP commands (continued)

    Command Function CEDA DFHCSDUP

    UPGRADE (DFHCSDUP only) Upgrades the CICS-supplied resourcedefinitions on the CSD file (for example, whenyou migrate to a higher release of CICS).

    TheDFHCSDUPUPGRADEcommand

    USERDEFINE Creates a new resource definition with yourown defaults.

    The CEDAUSERDEFINEcommand

    TheDFHCSDUPUSERDEFINEcommand

    VERIFY (DFHCSDUP only) Removes internal locks on groups and lists. TheDFHCSDUPVERIFYcommand

    VIEW (CEDA only) Shows the attributes of an existing resourcedefinition.

    The CEDAVIEWcommand

    Shared resources for intercommunicationResources that reside on a remote system, but are accessed by a local CICS system, have to be definedon both the remote and local systems. To avoid duplicating definitions in the CSD files for the local andremote systems, you can create resource definitions on a CSD file that is shared by the local and remotesystems. This reduces disk storage and maintenance, because you require only one CSD file record foreach shared resource.

    If you decide to use dual-purpose resource definition, you may want to consider reorganizing yourresources within your resource definition groups. For example, you might currently have two groups: onecontaining all the resources for a CICS transaction-owning region (TOR), and one containing all theresources for a CICS application-owning region (AOR).

    When you use shared resource definitions, you can have three groups, with the first group containingresources specific to the TOR, the second group containing resources specific to the AOR, and the thirdgroup containing resources to be installed in both the TOR and the AOR.

    These resources should be defined as both local and remote. When the definition is installed on the TOR,CICS compares the SYSIDNT name with the REMOTESYSTEM name. If they are different, a remotetransaction definition is created. When the definition is installed on the AOR, CICS compares theREMOTESYSTEM name with the SYSIDNT name. If they are the same, a local transaction definition isinstalled.

    Dual-purpose resource definition can be used with the following resources:

    • Files• Programs• Temporary storage models (TSMODELs)• Terminals• Transient data queues (TDQUEUEs)• Transactions

    12 CICS TS for z/OS: Configuring CICS

    https://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/upgrade.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/upgrade.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/upgrade.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/upgrade.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_userdefine.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_userdefine.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_userdefine.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/userdefine.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/userdefine.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/userdefine.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/userdefine.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/verify.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/verify.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/verify.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/verify.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_view.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_view.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_view.html

  • Security of resource definitionsCICS provides a number of facilities that help you keep your resource definitions secure fromunauthorized use.

    When you are considering the security of your resource definitions:Limited access to resource definitions in the CSD

    You should limit read/write access to resource definitions in the CSD to a small number of people. Todo this:

    • Protect groups of resources by using the CEDA command LOCK• Protect the list of resource groups that is specified in the system initialization parameter GRPLIST

    by using the CEDA command LOCK• Use the CEDB transaction to create resource definitions, but not to INSTALL them• Use the CEDC transaction for read-only access to resource definitions.

    For information about the CEDA LOCK and UNLOCK commands, see Resource managementtransaction CEDA commands.

    Resource security checking

    Resource security checking ensures that terminal operators can access only those resources forwhich they have been authorized. You can use resource security checking (RESSEC) for theTRANSACTION definition.

    Multiple CSD files

    You can have different CSD files for different CICS systems. The users of one CICS do not have accessto the CSD file for another CICS.

    You could have a test CSD file in a system where the RDO transactions can be used, and a productionCSD file in a system where the RDO transactions are not available. There would then be no chance ofunauthorized users altering resource definitions needed for production work.

    Read-only and update definitions for the same CSD file

    Having two CSD files means duplicating resource definitions for resources that are shared by morethan one system. An advantage of RDO is that you need only one definition for each resource. You candefine one CSD file to be shared among several CICS systems with only one having write access. Todo this, you define one CSD file differently to different systems by using the CSDACC systeminitialization parameter. For the system where the CSD file can be used but not updated, you specify:

    CSDACC=READONLY

    and, for the system where you are planning to update the CSD, you specify:

    CSDACC=READWRITE

    You need READONLY access to install definitions. This also allows you to use the DISPLAY and VIEWcommands. You need READWRITE access to use the ADD, APPEND, ALTER, COPY, MOVE, andRENAME commands. For information on defining the CSD file, see Resource management transactionCEDA commands.

    Controlling access to a group or list—LOCK and UNLOCK

    RDO also provides a means of controlling access to any group or list, so that users in the same systemcan have different types of access. This is done with the LOCK and UNLOCK commands.

    Chapter 2. CICS resources 13

    https://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_commands.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_commands.htmlhttps://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/reference/resources/ceda/commands/dfha4_commands.htmlhttps://www.ibm.com/support/knowledgece