09.12.2012 Views

Download PDF - IBM Redbooks

Download PDF - IBM Redbooks

Download PDF - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

J2C connector components<br />

J2C defines contracts between the application, the connector, and the<br />

application server where the application will be deployed:<br />

► Container contract<br />

The container contract defines what the application server expects to find in a<br />

deployed application. This is the standard contract between an EJB and its<br />

container. It consists of the bean callback methods, such as ejbCreate(),<br />

ejbLoad(), and ejbActivate().<br />

► Application contract<br />

The application contract defines what the connector expects to receive from<br />

the application. It is defined by the Common Client Interface (CCI) API.<br />

► System contract<br />

The system contract specifies the behavior that every J2C resource adapter<br />

must support. The contract components are:<br />

– Connection management contract<br />

This allows the application server, with the assistance of the adapter, to<br />

pool connections to the EIS.<br />

– Transaction management contract<br />

Transactions are a key concept needed to support distributed computing.<br />

– Security management contract<br />

This details the sign-on procedures that are carried out when the client in<br />

WebSphere establishes a connection to the resource adapter or EIS.<br />

These contracts imply that all participating components are J2EE connector<br />

architecture-compliant. The application, connector, and application server must<br />

all be compliant with the J2EE architecture.<br />

CICS authorization and authentication support<br />

Each application that accesses a JCA resource has a resource deployment<br />

descriptor (res-auth) that determines the authentication behavior when<br />

accessing the resource.<br />

Authentication can be done using:<br />

Container authentication When container authentication is specified,<br />

the user ID and password used on the<br />

connection are provided by the container.<br />

Application authentication When application authentication is specified,<br />

the user ID and password used on the<br />

connection are provided explicitly by the<br />

Chapter 1. Introduction 23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!