01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

124 <strong>CICS</strong> <strong>Transaction</strong> <strong>Gateway</strong> <strong>V5</strong><br />

new Terminal(<br />

epiGate, // <strong>CICS</strong> TG URL<br />

cicsRegion, // <strong>CICS</strong> server<br />

null, // device type<br />

null, // netname<br />

Terminal.EPI_SIGNON_INCAPABLE,<br />

userid, // userid for CTIN<br />

password, // password<br />

0, // timeout<br />

null); // encoding<br />

Screen scr = term.getScreen();<br />

term.connect(); // install terminal with CTIN<br />

term.setUserid(userid); // set userid for EPI request<br />

term.setPassword(password); // set passowrd<br />

scr.field(1).setText("EPIP"); // set EPIP user transaction code<br />

scr.setAID(AID.enter);<br />

term.send(); // start EPIP transaction<br />

....<br />

Figure 6-11 Using a signon incapable terminal<br />

To enable access from our SignonIncapable application to our EPIP test<br />

transaction, it was necessary to grant READ access for our <strong>CICS</strong>RS2 user ID to<br />

the RACF profiles protecting both the EPIP and CTIN transactions as follows:<br />

PERMIT SCSCPJA4.CTIN CLASS(T<strong>CICS</strong>TRN) ID(<strong>CICS</strong>USER) ACCESS(READ)<br />

PERMIT SCSCPJA4.EPIP CLASS(T<strong>CICS</strong>TRN) ID(<strong>CICS</strong>RS2) ACCESS(READ)<br />

SETROPTS RACLIST(T<strong>CICS</strong>TRN) REFRESH<br />

Tip: Unlike signon capable terminals, we found that when using signon<br />

incapable EPI terminals, we also had to ensure the link user ID had READ<br />

access to the T<strong>CICS</strong>TRN profile protecting the EPIP and CTIN transactions.<br />

However, instead of creating another profile, we fixed this by making our<br />

systems equivalent, by setting the SECURITYNAME in the CONNECTION<br />

definition to be the same as the region user ID (SCSCPJA4), as shown in<br />

Figure 6-8.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!