01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.1 Introduction to <strong>CICS</strong> security<br />

100 <strong>CICS</strong> <strong>Transaction</strong> <strong>Gateway</strong> <strong>V5</strong><br />

<strong>CICS</strong> uses the z/OS System Authorization Facility (SAF) to route authorization<br />

requests to an external security manager (ESM) to perform all its security<br />

checks. Any suitable ESM could be used, but as <strong>IBM</strong>’s RACF product is the most<br />

commonly used, the remainder of this book will refer to RACF. For complete<br />

information about <strong>CICS</strong> security, refer to the <strong>CICS</strong> RACF Security Guide,<br />

SC33-1701.<br />

Every <strong>CICS</strong> region requires certain special user IDs to be established, and also<br />

uses certain user ID when receiving inbound requests from other systems.<br />

<strong>The</strong>se user IDs are as follows:<br />

Region user ID This is the user ID under which the <strong>CICS</strong> job itself runs, and<br />

is a powerful user ID.<br />

Default user ID This is used when users do not explicitly sign on, and should<br />

be given very low authorization. It is specified in the SIT<br />

parameter DFLTUSER.<br />

Flowed user ID This is any user ID that is flowed in an ISC or MRO request,<br />

and includes user IDs flowed in ECI and EPI requests from<br />

Java applications.<br />

Link user ID This is a user ID defined on CONNECTION or SESSIONS<br />

definition. It is used in link security and to determine if<br />

connected systems are equivalent.<br />

Authentication of <strong>CICS</strong> users is the responsibility of RACF. Once authenticated,<br />

the user can pass through transaction security, resource security, command<br />

security, surrogate security, and, if the request is forwarded to another <strong>CICS</strong><br />

region, intercommunication security. <strong>The</strong>se are briefly explained in the following<br />

text.<br />

<strong>Transaction</strong> security<br />

<strong>CICS</strong> uses transaction security to control a user’s permission to start a<br />

transaction. <strong>CICS</strong> performs a transaction security check even if no user has<br />

signed on. Users who do not sign on can use only those transactions that are<br />

authorized to the <strong>CICS</strong> default user ID. Usually this ID is very limited in what it<br />

has access to.<br />

Resource security<br />

<strong>CICS</strong> provides a further (optional) level of security by controlling access to<br />

individual resources, which include programs, files, and started transactions.<br />

<strong>The</strong>re are no special implications for resource security with the <strong>CICS</strong> TG and so<br />

this subject is not addressed any further in this chapter.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!