04.04.2013 Views

Addressing OLTP Solutions with CICS: The Transaction Server ... - Ibm

Addressing OLTP Solutions with CICS: The Transaction Server ... - Ibm

Addressing OLTP Solutions with CICS: The Transaction Server ... - Ibm

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

or employee records, eavesdropping must be prevented through appropriate<br />

cryptographic techniques.<br />

<strong>The</strong> authorization protocols supported by the Web are still evolving, and there is<br />

no widely accepted implementation. Two security packages have been around<br />

for a while: Pretty Good Privacy and Kerberos. Two relatively new transaction<br />

security standards are likely to become integral parts of a future integrated<br />

security solution for the Web: secure HTTP and secure sockets. See the<br />

following URLs:<br />

http://www.netscape.com/newsref/std/SSL.html<br />

http://www.eit.com/projects/s-http/index.html<br />

http://www.ofs.org/www/dceweb/DCE-Web-Home-Page.html<br />

http://hoohoo.ncsa.uiuc.edu/doce/PEMPGP.html<br />

http://www.ibm.com/Security/glossary.html<br />

<strong>The</strong> IBM Internet Connection Secured Network Gateway (SNG) is an effective tool<br />

to protect your network from unauthorized access. It is based on research at<br />

IBM′s Yorktown Research Laboratory and experience running large networks for<br />

more than eight years. SNG supports all of the implementations above.<br />

<strong>The</strong> IBM Internet Connection Secure <strong>Server</strong>s and the Secure WebExplorer<br />

browsers ensure the validity of the parties in a transaction and keep<br />

communications private.<br />

9.5 Planning Considerations for the <strong>CICS</strong> Internet Gateway for AIX<br />

9.5.1 Preparation<br />

A presence on the Internet is intended to give competive advantage to an<br />

enterprise, not compromise its security. <strong>The</strong>refore you must carefully plan your<br />

approach to making applications available from the Internet and address a few<br />

configuration issues for implementing the <strong>CICS</strong> Internet Gateway for AIX.<br />

Before implementing the <strong>CICS</strong> Internet Gateway for AIX, become familiar <strong>with</strong><br />

what the Web is and is not and understand what the differences between <strong>OLTP</strong><br />

and the Web mean for your applications (see 9.3, “<strong>OLTP</strong> and the Web” on<br />

page 136).<br />

9.5.2 Choosing Your Applications<br />

9.5.3 Accessing Sensitive Data<br />

142 <strong>CICS</strong> for AIX as the <strong>Transaction</strong> <strong>Server</strong><br />

Decide which applications and data are suitable for use on the Internet. <strong>The</strong><br />

applications should be informative and helpful. It may be neccesary to<br />

redevelop applications, possibly focusing on the user interface. <strong>The</strong> typical user<br />

is likely to be far less computer literate than the employees of the your<br />

enterprise who were previously using the application<br />

Determine whether sensitive data in the <strong>CICS</strong> system in which the<br />

Internet-accessible applications are running can be accessed. You may want to<br />

provide an isolated system whose sole purpose is to run the Internet-accessible<br />

applications.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!