01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Basic <strong>CICS</strong> TG configuration<br />

<strong>The</strong> commands listed in the following sections are in addition to the basic<br />

configuration necessary for normal functioning of the <strong>CICS</strong> TG for z/OS. Before<br />

you implement any security in your environment, we recommend that you set up<br />

and test a non-secure environment as documented in Chapter 4, “EXCI<br />

connections to <strong>CICS</strong>” on page 65 and Chapter 7, “TCP connections to the<br />

<strong>Gateway</strong> daemon on z/OS” on page 133. In this chapter, you will find<br />

documented the following actions, which are necessary for the normal<br />

functioning of the <strong>CICS</strong> TG in a non-secure environment:<br />

► Setup of the started task user ID<br />

► Access to the TCPIP.STANDARD.TCPXLBIN data set<br />

► Removal of the share bit (s extended attribute) from the ctgstart script<br />

► Access to the BPX.SERVER profile<br />

► Enabling of program control for <strong>CICS</strong> TG data sets and HFS files<br />

We now document the following steps necessary to secure access to our <strong>CICS</strong><br />

program EC01:<br />

► Configure MRO bind time security<br />

► Enable <strong>CICS</strong> TG password checking<br />

► Configure security for <strong>CICS</strong> CONNECTION and SESSIONS definitions<br />

► Configure the flowed user ID<br />

► Permit access to the mirror transaction, CSMI<br />

► Define RACF surrogate profiles<br />

104 <strong>CICS</strong> <strong>Transaction</strong> <strong>Gateway</strong> <strong>V5</strong><br />

Note: We used security prefixing (SECPRFX=YES) in our <strong>CICS</strong> region, which<br />

prevents our RACF security profiles from affecting other <strong>CICS</strong> regions. This<br />

can be quite useful in a production environment, since it means all security<br />

profiles are unique to an individual region, but conversely it can mean more<br />

work for the security administrator because more profiles must be defined.<br />

Tip: We encountered problems when running a transactional EXCI request<br />

(using EciI1) with security enabled on the <strong>CICS</strong> TG. Each time we ran a<br />

request we would see dirty address space errors when attempting to access<br />

module DFHXCSVC in the SDHFLINK library. Marking<br />

<strong>CICS</strong>TS22.<strong>CICS</strong>.SDFHLINK as program controlled solved this problem.<br />

MRO bind security (DFHAPPL FACILITY class profiles)<br />

MRO bind security prevents unauthorized attached MRO regions from starting<br />

transactions in a <strong>CICS</strong> region, and as such applies equally to the <strong>CICS</strong> TG, as a<br />

user of MRO, as it does to <strong>CICS</strong>. It is implemented using two different DFHAPPL<br />

FACILITY class profiles that control logon to IRP. To log on to IRP, the user ID<br />

under which the <strong>CICS</strong> TG runs requires the following permissions:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!