3270 Screen

Active, Display

Active, Install

Apply

Copy

Deadlock Timeout

Delete

Description

Dump

Dump on Abend

Dynamic Route

Group List

Inbound, enabled

In Doubt

Input Timeout

Name

Priority

Program Name

Remote SysID

Resource Keys, 1 - 24

Resource Keys, all

Rmt PCT

Runaway Timeout

Security

Security Keys, 1 - 64

Security Keys, all

Status

Tracing

Upper Case, Translate

Use System Value

Use System Value

Use System Value

Work Area

CICS PCT - pct_name (group_name)

Use this page to view and, if you have the required permissions, to edit the PCT pct_name.

The title bar gives the name (pct_name) of the PCT you are editing and the resource group (group_name) it belongs to.

Top

Group List

Click this to view the CICS Group page group_name.

Top

Apply

Click this to save changes you have made to the page and refresh the page. This button is displayed only if you have permission to edit the group in which the PCT resides.

Top

Name

Shows the name of this PCT.

Top

Description

Specify a description for the PCT. Can be up to 60 characters long.

Top

Program Name

For local programs only, specify the name of the application program to be run when this transaction is invoked. This field should be blank if there is a value in the remote system ID field.

Can be up to eight characters (A-Z, 0-9, #, @, or $). The name is translated to upper case.

Top

Work Area

Specify the size of the transaction program's Transaction Working Area (TWA) in bytes, in the range 0 through 32767.

Top

Remote SysID

Specify the system ID of the remote system.

Top

Rmt PCT

Specify the transaction ID of the transaction program on the remote system. You must specify Remote SysID before you can specify a transaction ID.

Can be up to four alphanumeric characters, the first of which must be a letter. Do not use the letter C as the first character; transaction IDs beginning with C are reserved for use by MTO.

Top

Input Timeout

Specify the maximum time in seconds allowed for operator response to an explicit CICS RECEIVE command before this transaction is abended. A value of 0 indicates that there is no timeout.

Top

Use System Value

Check this to use the system wide value for Input Timeout (as shown on the ESMAC Control screen) rather than the PCT entry.

Top

Runaway Timeout

Specify the maximum continuous period of time in seconds that the region will allow this transaction to run without making a CICS, EZASOKET or MQSeries API call. When this time is exceeded, the transaction is abended. A value of 0 indicates that there is no timeout.

Top

Use System Value

Check this to use the system wide value for Runaway Timeout (as shown on the ESMAC Control screen) rather than the PCT entry.

Top

Deadlock Timeout

Specify the maximum time in seconds that the region will permit this transaction to wait for a resource that has been locked by another process. A value of 0 indicates that there is no timeout.

Top

Use System Value

Check this to use the system wide value for Deadlock Timeout (as shown on the ESMAC Control screen) rather than the PCT entry.

Top

Priority

Specify the transaction priority of the transaction program in the range 0 through 255, where 255 is the highest priority.

The priority of a transaction is the sum of:

This sum must not be greater than 255.

Top

Status

Choose the status of the transaction program:

Top

In Doubt

Choose what happens if a transaction program using intersystem communication abends at a critical moment during syncpoint or abend processing:

Top

Upper Case, Translate

Check this to indicate that the transaction program is to translate input into upper case.

Top

Tracing

Choose the type of tracing to be performed for the transaction program:

Top

Dynamic Route

Check this to indicate that the program status (local or remote) is to be determined dynamically at user invocation time. Leave this unchecked to indicate that the program status is to be made local or remote according to the value of System ID.

Top

Security

Use these check boxes to control the way in which resource authorization checks are performed. If they are not checked, the only check performed will be to confirm that the user has authority to run the transaction. If you check RLS (Resource Level Security), Enterprise Server will check the user's authorization for all resources that the transaction accesses (e.g. file access, TDQ, TSQ, LINK, DPL, START and so on). Checking CMD(for Command) will check the authorization on all the EXEC CICS command operations (e.g. EXEC CICS SET/ENABLE/DISABLE).

Note that IBM Category 3 Transactions do not have security checking at all, so the transactions are allowed for everyone with no authorization calls.

Top

3270 Screen

Choose the screen size to be used by the transaction program:

Top

Dump on Abend

Check this to request a program dump if the transaction program abends.

Top

Inbound, enabled

Check this to indicate that this transaction can be initiated by an inbound user action.

Top

Resource Keys, all

Choose a setting to apply to all the resource keys:

Top

Resource Keys, 1 - 24

Check any of the boxes 1 through 24 to activate that resource key.

Top

Security Keys, all

Choose a setting to apply to all the security keys:

Top

Security Keys, 1 - 64

Check any of the boxes 1 through 64 to activate that security key.

Top

Active, Display

Click this to display the currently installed definition of this resource.

Top

Active, Install

Click this to install (make active) this resource.

Top

Delete

Click this to delete this PCT. You see this button only if you have editing permissions for the group to which the PCT belongs.

Top

Copy

Click this to create a new PCT, using the values set on this page as the basis for the new PCT.

Top

Dump

Click this to create and view dump information for this PCT.

Top