01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.2.2 ECI to <strong>CICS</strong> TG for Windows (TCP/IP)<br />

112 <strong>CICS</strong> <strong>Transaction</strong> <strong>Gateway</strong> <strong>V5</strong><br />

In this example we show you how we configured security to allow an ECI-based<br />

Java application to make an authenticated call to <strong>CICS</strong> using the facilities of the<br />

<strong>CICS</strong> TG for Windows, using a TCP/IP connection to our <strong>CICS</strong> TS V2.2 region<br />

(Figure 6-4).<br />

As in the previous example, we used the supplied sample EciB1, and the <strong>CICS</strong><br />

server program, EC01, in our test. <strong>The</strong> aim of our test was to permit the user ID<br />

<strong>CICS</strong>RS2 access to the EC01 program and deny access to the user <strong>CICS</strong>RS5.<br />

Windows client<br />

Java<br />

application<br />

EciB1<br />

Port<br />

2006<br />

Windows NT<br />

volga<br />

<strong>CICS</strong> TG V4.0.2<br />

<strong>Gateway</strong><br />

daemon<br />

Client<br />

daemon<br />

Figure 6-4 ECI to <strong>CICS</strong> TG for Windows, security scenario<br />

JNI<br />

ECI request<br />

TCP/IP<br />

user ID +<br />

password<br />

TCPIP<br />

service<br />

z/OS<br />

<strong>CICS</strong> TS V2.2<br />

Region<br />

SCSCPAA6<br />

EC01<br />

program<br />

RACF<br />

TCP/IP security configuration<br />

When using TCP/IP connections to <strong>CICS</strong>, the <strong>CICS</strong> TG provides support for the<br />

flowing of a user ID and password within the ECI request, for authentication of<br />

this user ID and password within <strong>CICS</strong>, and authorization of requests using<br />

RACF. In the instructions that follow, we detail how we configured security in our<br />

<strong>CICS</strong> region and <strong>CICS</strong> TG.<br />

Basic <strong>CICS</strong> TG configuration<br />

In this section, we assume that you have already installed the <strong>CICS</strong> TG for<br />

Windows and configured a TCP/IP connection from the <strong>CICS</strong> TG to <strong>CICS</strong> TS<br />

V2.2. For further details on how to configure TCP/IP connections, refer to<br />

Chapter 5, “TCP/IP connections to <strong>CICS</strong>” on page 81.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!