Configuring CICS to use asserted identity authentication

You can configure each CorbaServer in your CICS® region as:
An intermediate server
The intermediate server authenticates a client using whatever authentication protocol is appropriate.
A target server
The target server trusts the intermediate server to authenticate the client, and does not perform its own authentication.
In either case, you must establish a trust relationship between the intermediate and target servers.