01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

EciB1 is written so that it will initially make a call to the specified <strong>CICS</strong> region<br />

without a user ID and password, and then if it receives a security error it will then<br />

prompt you for a user ID and password. It also allows trace to be activated by<br />

specifying -Dgateway.T.trace=on. This will trace the <strong>CICS</strong> TG calls made in the<br />

Java application and is particularly useful in showing the user ID and<br />

COMMAREA flowed to and from the <strong>CICS</strong> TG.<br />

When we ran EciB1 with trace on, we saw the following input on the first ECI call<br />

to the <strong>CICS</strong> TG specifying SCSCPJA4 as the <strong>CICS</strong> region. As seen in<br />

Example 6-4, the user ID at offset 57 is not set (low values), because we have<br />

not been prompted for it as yet.<br />

Example 6-4 EciB1 object/COMMAREA on initial call (created with -Dgateway.T.trace=on)<br />

S-C: CCL6603I: # 00000: 47 61 74 65 00 40 00 00 00 00 00 01 00 00 00 00 Gate.@..........<br />

S-C: CCL6603I: # 00016: 00 00 00 00 00 00 00 03 45 43 49 00 00 00 00 60 ........ECI....`<br />

S-C: CCL6603I: # 00032: 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 ................<br />

S-C: CCL6603I: # 00048: 00 53 43 53 43 50 4A 41 34 00 00 00 00 00 00 00 .SCSCPJA4.......<br />

S-C: CCL6603I: # 00064: 00 00 00 00 00 00 00 00 00 2A 2A 2A 2A 2A 2A 2A .........*******<br />

In Example 6-5, we see the second ECI request to the <strong>CICS</strong> TG, after we had<br />

been prompted for a user ID and password. This time the user ID (<strong>CICS</strong>RS2) is<br />

contained in the ECI request and you can see the password (********) is masked<br />

for security reasons.<br />

Example 6-5 EciB1 object/COMMAREA after ID and password input (created with -Dgateway.T.trace=on)<br />

S-C: CCL6603I: # 00000: 47 61 74 65 00 40 00 00 00 00 00 01 00 00 00 00 Gate.@..........<br />

S-C: CCL6603I: # 00016: 00 00 00 00 00 00 00 03 45 43 49 00 00 00 00 60 ........ECI....`<br />

S-C: CCL6603I: # 00032: 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 ................<br />

S-C: CCL6603I: # 00048: 00 53 43 53 43 50 4A 41 34 63 69 63 73 72 73 32 .SCSCPJA4<strong>CICS</strong>RS2<br />

S-C: CCL6603I: # 00064: 00 00 00 00 00 00 00 00 00 2A 2A 2A 2A 2A 2A 2A .........*******<br />

Chapter 6. <strong>CICS</strong> TG security scenarios 111

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!