Figure 1 shows the expected flows between
the PEM client and CICS PEM server during a successful sign-on when PV is
not being used.
Figure 1. Expected flows
for a successful sign-on with a non-PV connection.
This is the
expected sequence of events: - The session between the PEM client logical unit and the CICS PEM server
logical unit is established.
- The PEM client gathers data, and sends data for the sign-on program request
to the server, requesting a reply. The request flow contains BB, CD, FMH5,
and data.
- The CICS PEM server ignores the security fields in the FMH5. It processes
the data to issue the sign on (or sign on with changed password).
- The server sends the reply and deallocates the session. The reply flow
contains CEB and data.
- The client receives and processes the reply.
Note: All security fields in the FMH-5 (userid, password and UP, AV, PV1 and
PV2 bits) are ignored by the CICS PEM server when it attaches the sign-on
transaction.