01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

116 <strong>CICS</strong> <strong>Transaction</strong> <strong>Gateway</strong> <strong>V5</strong><br />

SignonIncapable) are written to use the EPI support classes, and are available<br />

with the additional materials for this book (see Appendix C, “Additional material”<br />

on page 389). Both of these applications work with the <strong>CICS</strong> 3270 program,<br />

EPIPROG, which is a very simple BMS-based application that returns a map<br />

displaying the <strong>CICS</strong> region APPLID, date, time, and the user ID the task ran<br />

under (Figure 6-7).<br />

EPIPROG OUTPUT<br />

APPLID: SCSCPJA4<br />

DATE: 25/06/02<br />

TIME: 00:45:38<br />

USERID: <strong>CICS</strong>RS2<br />

Figure 6-7 EPIP 3270 screen<br />

<strong>The</strong> source code (EPIPROG), and the mapset (EPIPMAPS) for this application<br />

are provided in the additional material available with this redbook, along with the<br />

associated map class EPIMAPMap.java.<br />

Signon capable terminals<br />

When using the facilities of the EPI, the <strong>CICS</strong> TG creates a logical terminal in<br />

<strong>CICS</strong> for you, which is then used to run the 3270 transaction. For an EPI<br />

application to be able to start a secured <strong>CICS</strong> transaction on this terminal, it must<br />

supply security credentials (a user ID and password) for the <strong>CICS</strong> server to<br />

authenticate. <strong>The</strong>re are two options available to do this:<br />

► Sign on to the <strong>CICS</strong> terminal<br />

<strong>The</strong> security credentials determined are established at sign-on (by starting a<br />

transaction such as CESN). <strong>The</strong>se credentials are then used for any<br />

subsequent authorization checks when starting other transactions. <strong>The</strong> user<br />

ID and password need not flow with further requests following the sign-on.<br />

This requires a signon capable EPI terminal.<br />

► Flow a user ID and password with each EPI request<br />

A valid user ID and password must be flowed with each EPI request. This<br />

method does not require the user to sign on to <strong>CICS</strong>, and so uses a signon<br />

incapable EPI terminal.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!