Different security options are available on the connection
when CICS Transaction Gateway is used for connecting client applications
to CICS; the available options are platform and protocol dependent.
EXCI connection security
EXCI connections enforce link, bind and user security.
Link security restricts the resources that can be accessed over a
connection to a CICS server, bind security prevents an unauthorized
client system from connecting to CICS, and user security restricts
the CICS resources that can be accessed by a user.
IPIC connection security
IPIC connections enforce link security to restrict
the resources that can be accessed over a connection to a CICS® server, bind security to prevent
an unauthorized client system from connecting to CICS, and user security to restrict the CICS resources that can be accessed
by a user. If the CICS server
supports password phrases, a password phrase can be used for user
security.