01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CONNECTION and SESSIONS definitions<br />

In order for our <strong>CICS</strong> region to use the user ID flowed in the EXCI call from the<br />

<strong>CICS</strong> TG, we set the parameter ATTACHSEC=IDENTIFY in our EXCI connection<br />

definition in our <strong>CICS</strong> region SCSCPJA4, as shown in Figure 6-2.<br />

OVERTYPE TO MODIFY <strong>CICS</strong> RELEASE = 0620<br />

CEDA ALter CONnection( CTG4 )<br />

CONnection : CTG4<br />

Group : PJA4CTG4<br />

DEscription ==><br />

CONNECTION IDENTIFIERS<br />

Netname ==> SCSCTG4<br />

INDsys ==><br />

CONNECTION PROPERTIES<br />

ACcessmethod ==> IRc Vtam | IRc | INdirect | Xm<br />

PRotocol ==> Exci Appc | Lu61 | Exci<br />

Conntype ==> Specific Generic | Specific<br />

SECURITY<br />

SEcurityname ==><br />

ATtachsec ==> Identify Local | Identify | Verify<br />

| Persistent | Mixidpe<br />

BINDPassword : PASSWORD NOT SPECIFIED<br />

BINDSecurity ==> No No | Yes<br />

Usedfltuser ==> No No | Yes<br />

Figure 6-2 <strong>CICS</strong> CONNECTION definition<br />

SYSID=PJA4 APPLID=SCSCPJA4<br />

IDENTIFY means that <strong>CICS</strong> uses the flowed user ID in the EXCI request, but<br />

does not expect a password to be flowed with the request, as this should be<br />

checked by the <strong>CICS</strong> TG itself.<br />

Link security<br />

Next we decided to disable link security. Link security is an additional level of<br />

security that applies to all attach requests received over a connection. For MRO<br />

or EXCI requests, this is set as follows.<br />

<strong>The</strong> SESSIONS definition is checked as follows:<br />

1. If the link user ID is the same as the region user ID, then the systems are<br />

deemed equivalent and no link security authorization is performed.<br />

2. If the link user ID is defined as anything else, then this user ID must have<br />

access to all resources that the EXCI requests need.<br />

Chapter 6. <strong>CICS</strong> TG security scenarios 107

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!