01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6<br />

Chapter 6. <strong>CICS</strong> TG security scenarios<br />

In this chapter, we describe how to use and implement <strong>CICS</strong>-RACF security<br />

when using the <strong>CICS</strong> <strong>Transaction</strong> <strong>Gateway</strong> (<strong>CICS</strong> TG).<br />

We start with a brief overview of <strong>CICS</strong> security and then move on to document a<br />

set of end-to-end security scenarios to show you how we secured the following<br />

scenarios:<br />

► ECI request to <strong>CICS</strong> using the <strong>CICS</strong> TG for z/OS<br />

► ECI request to <strong>CICS</strong> using the <strong>CICS</strong> TG for Windows<br />

► EPI request to <strong>CICS</strong> using the <strong>CICS</strong> TG for Windows<br />

© Copyright <strong>IBM</strong> Corp. 2001 2002. All rights reserved. 99

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!