01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In contrast, Example 6-8 shows the result of an unauthorized user (<strong>CICS</strong>RS5)<br />

attempting to access the EPIP transaction.<br />

Example 6-8 Security failure with SignonCapable EPI test<br />

C:\itsoctgv5\Java>java itso.cics.epi.SignonCapable tcp:\\volga SC62PJA4 <strong>CICS</strong>RS5<br />

PASSWORD<br />

<strong>Gateway</strong> URL: tcp://volga/<br />

Region: SC62PJA4<br />

Userid: <strong>CICS</strong>RS5<br />

Password: PASSWORD<br />

Unknown EPI error encountered<br />

Error message was :Map is not valid<br />

com.ibm.ctg.epi.EPIMapException: Map is not valid<br />

at itso.cics.epi.EPIMAPMap.(EPIMAPMap.java:42)<br />

at itso.cics.epi.SignonCapable.main(SignonCapable.java:159)<br />

<strong>The</strong> EPIMapException error in Example 6-8 merely states that the screen received<br />

when running the EPIP transaction was not expected. This is because we used<br />

the EPI Map class to handle the expected output from the EPIP transaction. <strong>The</strong><br />

actual cause of the error can be seen by examining the <strong>CICS</strong> JESMSGLG where<br />

the following security violation was logged.<br />

Example 6-9 JES SYSLOG error for EPIP security violation<br />

ICH408I USER(<strong>CICS</strong>RS5 ) GROUP(SYS1 ) NAME(<strong>CICS</strong> RESIDENT ) 552<br />

SCSCPJA4.EPIP CL(T<strong>CICS</strong>TRN)<br />

INSUFFICIENT ACCESS AUTHORITY<br />

ACCESS INTENT(READ ) ACCESS ALLOWED(NONE )<br />

Flow a user ID and password with each EPI request<br />

If your <strong>CICS</strong> application does not need to invoke an EXEC <strong>CICS</strong> SIGNON, then a<br />

better option is to use signon incapable terminals. With this method the EPI user<br />

is not required to explicitly sign on to <strong>CICS</strong>. Instead a user ID and password must<br />

be supplied with each EPI request, and these are flowed in the FMH attach<br />

header and verified for each request. A sample code snippet demonstrating this<br />

technique is shown in Figure 6-11 on page 124. <strong>The</strong> full version of this code is<br />

provided in our sample Java application SignonIncapable.java in the<br />

itso.cics.epi package supplied with this book.<br />

Chapter 6. <strong>CICS</strong> TG security scenarios 123

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!