Addressing OLTP Solutions with CICS: The Transaction Server ... - Ibm
Addressing OLTP Solutions with CICS: The Transaction Server ... - Ibm
Addressing OLTP Solutions with CICS: The Transaction Server ... - Ibm
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
or employee records, eavesdropping must be prevented through appropriate<br />
cryptographic techniques.<br />
<strong>The</strong> authorization protocols supported by the Web are still evolving, and there is<br />
no widely accepted implementation. Two security packages have been around<br />
for a while: Pretty Good Privacy and Kerberos. Two relatively new transaction<br />
security standards are likely to become integral parts of a future integrated<br />
security solution for the Web: secure HTTP and secure sockets. See the<br />
following URLs:<br />
http://www.netscape.com/newsref/std/SSL.html<br />
http://www.eit.com/projects/s-http/index.html<br />
http://www.ofs.org/www/dceweb/DCE-Web-Home-Page.html<br />
http://hoohoo.ncsa.uiuc.edu/doce/PEMPGP.html<br />
http://www.ibm.com/Security/glossary.html<br />
<strong>The</strong> IBM Internet Connection Secured Network Gateway (SNG) is an effective tool<br />
to protect your network from unauthorized access. It is based on research at<br />
IBM′s Yorktown Research Laboratory and experience running large networks for<br />
more than eight years. SNG supports all of the implementations above.<br />
<strong>The</strong> IBM Internet Connection Secure <strong>Server</strong>s and the Secure WebExplorer<br />
browsers ensure the validity of the parties in a transaction and keep<br />
communications private.<br />
9.5 Planning Considerations for the <strong>CICS</strong> Internet Gateway for AIX<br />
9.5.1 Preparation<br />
A presence on the Internet is intended to give competive advantage to an<br />
enterprise, not compromise its security. <strong>The</strong>refore you must carefully plan your<br />
approach to making applications available from the Internet and address a few<br />
configuration issues for implementing the <strong>CICS</strong> Internet Gateway for AIX.<br />
Before implementing the <strong>CICS</strong> Internet Gateway for AIX, become familiar <strong>with</strong><br />
what the Web is and is not and understand what the differences between <strong>OLTP</strong><br />
and the Web mean for your applications (see 9.3, “<strong>OLTP</strong> and the Web” on<br />
page 136).<br />
9.5.2 Choosing Your Applications<br />
9.5.3 Accessing Sensitive Data<br />
142 <strong>CICS</strong> for AIX as the <strong>Transaction</strong> <strong>Server</strong><br />
Decide which applications and data are suitable for use on the Internet. <strong>The</strong><br />
applications should be informative and helpful. It may be neccesary to<br />
redevelop applications, possibly focusing on the user interface. <strong>The</strong> typical user<br />
is likely to be far less computer literate than the employees of the your<br />
enterprise who were previously using the application<br />
Determine whether sensitive data in the <strong>CICS</strong> system in which the<br />
Internet-accessible applications are running can be accessed. You may want to<br />
provide an isolated system whose sole purpose is to run the Internet-accessible<br />
applications.