Successful sign-on—non-PV connection

Figure 1 shows the expected flows between the PEM client and CICS PEM server during a successful sign-on when PV is not being used.
Figure 1. Expected flows for a successful sign-on with a non-PV connection. This is the expected sequence of events:
  1. The session between the PEM client logical unit and the CICS PEM server logical unit is established.
  2. The PEM client gathers data, and sends data for the sign-on program request to the server, requesting a reply. The request flow contains BB, CD, FMH5, and data.
  3. The CICS PEM server ignores the security fields in the FMH5. It processes the data to issue the sign on (or sign on with changed password).
  4. The server sends the reply and deallocates the session. The reply flow contains CEB and data.
  5. The client receives and processes the reply.
This figure illustrates the expected flows for a successful sign-on with a non-PV connection
Note: All security fields in the FMH-5 (userid, password and UP, AV, PV1 and PV2 bits) are ignored by the CICS PEM server when it attaches the sign-on transaction.