Security

CICS® Transaction Gateway provides a secure way of connecting to CICS using standard security mechanisms. These mechanisms integrate with security provided by the JEE application server and with security provided by CICS.

Network security

Network security is the ability to provide authentication and encryption over a network connection using these security technologies:

  • Secure Sockets Layer (SSL) or Transport Layer Security (TLS) from a Java™ client application to CICS Transaction Gateway
  • SSL or TLS from a Java client application to a CICS server using IPIC
  • Security exits

Underlying security technologies such as Internet Protocol Security (IPSec) are also supported.

User authentication

User authentication is the process by which a service verifies a user's authenticity. Verification is through the use of credentials, usually a password or a certificate. User authentication can be implemented for all protocols.

Link security

Link security prevents a remote user from attaching to a transaction in CICS, or accessing a resource for which the link user ID has no authority. Link security provides an additional check on user authentication through the use of a preset user ID on the CICS server connection. Link security can be implemented for the IPIC and EXCI protocols.

Bind security

Bind security prevents an unauthorized remote system from connecting to CICS. Bind security can be implemented for the IPIC and EXCI protocols.


Information Information

Feedback


Timestamp icon Last updated: Tuesday, 19 November 2013


https://ut-ilnx-r4.hursley.ibm.com/tgzos_latest/help/topic/com.ibm.cics.tg.zos.doc//ctgzos/ctg_secu1.html