01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1. SC62PJA1 -<strong>CICS</strong>TS 2.2 AT SC66<br />

2. SCSCPJA4 -<strong>CICS</strong>TS 2.2 AT SC66<br />

Choose Server to connect to, or q to quit:<br />

2<br />

Enter your <strong>CICS</strong> User ID:<br />

<strong>CICS</strong>RS2<br />

Enter your <strong>CICS</strong> Password:<br />

PASSWORD<br />

Program EC01 returned with data:-<br />

Hex: 32332f30362f30322031303a35373a34370<br />

ASCII text: 23/06/02 10:57:47<br />

6.2.3 EPI to <strong>CICS</strong> TG for Windows (TCP62)<br />

In this example, we show you how we configured security to allow an EPI-based<br />

Java application to make an authenticated call to <strong>CICS</strong> using the facilities of the<br />

<strong>CICS</strong> TG for Windows, using a TCP62 connection to our <strong>CICS</strong> TS V2.2 region<br />

(Figure 6-6). Since we were using the EPI to access a 3270-based <strong>CICS</strong><br />

transaction, we decided to use the TCP62 communication protocol, since EPI is<br />

not supported either by the <strong>CICS</strong> TCP/IP protocol or by the <strong>CICS</strong> TG for z/OS.<br />

Windows client<br />

Java<br />

application<br />

Port<br />

2006<br />

Windows 2000<br />

volga<br />

<strong>CICS</strong> TG V4.0.2<br />

<strong>Gateway</strong><br />

daemon<br />

Figure 6-6 EPI to <strong>CICS</strong> TG for Windows, security scenario<br />

JNI<br />

Client<br />

daemon<br />

EPI request<br />

TCP62<br />

user ID +<br />

password<br />

Virtual<br />

terminal<br />

z/OS<br />

<strong>CICS</strong> TS V2.2<br />

Region<br />

SCSCPAA6<br />

RACF<br />

Unlike the previous ECI examples, we decided to write our own test applications,<br />

because we wanted to show the difference between signon capable and signon<br />

incapable terminals. Our sample Java applications (SignonCapable and<br />

EPIP<br />

Chapter 6. <strong>CICS</strong> TG security scenarios 115

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!