The Complete Guide to CICS Transaction Gateway Volume 1 Configuration and Administration

The Complete Guide to CICS Transaction Gateway Volume 1 Configuration and Administration
Author: Rufus Credle
Publisher: IBM Redbooks
Total Pages: 396
Release: 2014-08-08
Genre: Computers
ISBN: 0738439738

In this IBM® Redbooks® publication, you will gain an appreciation of the IBM CICS® Transaction Gateway (CICS TG) product suite, based on key criteria, such as capabilities, scalability, platform, CICS server support, application language support, and licensing model. Matching the requirements to available infrastructure and hardware choices requires an appreciation of the choices available. In this book, you will gain an understanding of those choices, and will be capable of choosing the appropriate CICS connection protocol, APIs for the applications, and security options. You will understand the services available to the application developer when using a chosen protocol. You will then learn about how to implement CICS TG solutions, taking advantage of the latest capabilities, such as IPIC connectivity, high availability, and Dynamic Server Selection. Specific scenarios illustrate the usage of CICS TG for IBM z/OS®, and CICS TG for Multiplatforms, with CICS Transaction Server for z/OS and IBM WebSphere® Application Server, including connections in CICS, configuring simple end-to-end connectivity (all platforms) with verification for remote and local mode applications, and adding security, XA support, and high availability.

Migration to CICS Transaction Server for z/VSE V2.1

Migration to CICS Transaction Server for z/VSE V2.1
Author: Klaus Wacker
Publisher: IBM Redbooks
Total Pages: 286
Release: 2017-05-10
Genre: Computers
ISBN: 0738442461

The IBM® CICS® Transaction Server for z/VSE® (CICS TS for z/VSE) 2.1 provides functions to improve application programming, system programming, system management, and data security and availability. With CICS TS for z/VSE 2.1, you can use the extended functionality of Basic Security Manager. CICS TS for z/VSE 2.1 can be administrated by the IBM CICS Explorer® function on a workstation, which allows CICS management in a convenient way. This IBM Redbooks® publication provides information to help you install, tailor, and configure the CICS TS for z/VSE 2.1 product. The book is intended for IBM z/VSE customers and IBM technical personnel who are responsible for planning and migrating to IBM z/VSE 6.1 and CICS TS for z/VSE 2.1. The book also provides information to help you understand the affect of migrating to CICS TS for z/VSE 2.1. It provides detailed guidance and samples for installing and configuring CICS TS for z/VSE 2.1. Also included in the book is a description of the CICS TS for z/VSE 2.1 features and capabilities and the affect of removing obsolete functions. The book also covers security and performance issues and provides samples for first level problem determination through the use of memory dumps or the use of trace tools.

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
Author: Axel Buecker
Publisher: IBM Redbooks
Total Pages: 200
Release: 2015-11-02
Genre: Computers
ISBN: 0738441023

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

The Next Generation of Distributed IBM CICS

The Next Generation of Distributed IBM CICS
Author: Raghavendran Srinivasan
Publisher: IBM Redbooks
Total Pages: 522
Release: 2015-06-03
Genre: Computers
ISBN: 0738440574

This IBM® Redbooks® publication describes IBM TXSeries® for Multiplatforms, which is the premier IBM distributed transaction processing software for business-critical applications. Before describing distributed transaction processing in general, we introduce the most recent version of TXSeries for Multiplatforms. We focus on the following areas: The technical value of TXSeries for Multiplatforms New features in TXSeries for Multiplatforms Core components of TXSeries Common TXSeries deployment scenarios Deployment, development, and administrative choices Technical considerations It also demonstrates enterprise integration with products, such as relational database management system (RDBMS), IBM WebSphere® MQ, and IBM WebSphere Application Server. In addition, it describes system customization, reviewing several features, such as capacity planning, backup and recovery, and high availability (HA). We describe troubleshooting in TXSeries. We also provide details about migration from version to version for TXSeries. A migration checklist is included. We demonstrate a sample application that we created, called BigBlueBank, its installation, and the server-side and client-side programs. Other topics in this book include application development and system administration considerations. This book describes distributed IBM Customer Information Control System (IBM CICS®) solutions, and how best to develop distributed CICS applications.

Application Development for IBM CICS Web Services

Application Development for IBM CICS Web Services
Author: O'Grady James
Publisher: IBM Redbooks
Total Pages: 552
Release: 2015-01-27
Genre: Computers
ISBN: 0738440310

This IBM® Redbooks® publication focuses on developing Web service applications in IBM CICS®. It takes the broad view of developing and modernizing CICS applications for XML, Web services, SOAP, and SOA support, and lays out a reference architecture for developing these kinds of applications. We start by discussing Web services in general, then review how CICS implements Web services. We offer an overview of different development approaches: bottom-up, top-down, and meet-in-the-middle. We then look at how you would go about exposing a CICS application as a Web service provider, again looking at the different approaches. The book then steps through the process of creating a CICS Web service requester. We follow this by looking at CICS application aggregation (including 3270 applications) with IBM Rational® Application Developer for IBM System z® and how to implement CICS Web Services using CICS Cloud technology. The first part is concluded with hints and tips to help you when implementing this technology. Part two of this publication provides performance figures for a basic Web service. We investigate some common variables and examine their effects on the performance of CICS as both a requester and provider of Web services.

IBM CICS and Liberty: What You Need to Know

IBM CICS and Liberty: What You Need to Know
Author: Hernan Cunico
Publisher: IBM Redbooks
Total Pages: 252
Release: 2017-03-15
Genre: Computers
ISBN: 0738441368

This IBM® Redbooks® publication, intended for architects, application developers, and system programmers, describes how to design and implement Java web-based applications in an IBM CICS® Liberty JVM server. This book is based on IBM CICS Transaction Server V5.3 (CICS TS) using the embedded IBM WebSphere® Application Server Liberty V8.5.5 technology. Liberty is an asset to your organization, whether you intend to extend existing enterprise services hosted in CICS, or develop new web-based applications supporting new lines of business. Fundamentally, Liberty is a composable, dynamic profile of IBM WebSphere Application Server that enables you to provision Java EE technology on a feature-by-feature basis. Liberty can be provisioned with as little as the HTTP transport and a servlet web container, or with the entire Java EE 6 Web Profile feature set depending on your application requirements. This publication includes a Technology Essentials section for architects and application developers to help understand the underlying technology, an Up-and-Running section for system programmers implementing the Liberty JVM server for the first time, and a set of real-life application development scenarios.

z/OS Identity Propagation

z/OS Identity Propagation
Author: Karan Singh
Publisher: IBM Redbooks
Total Pages: 182
Release: 2011-09-29
Genre: Computers
ISBN: 0738436062

This IBM® Redbooks® publication explores various implementations of z/OS® Identity Propagation where the distributed identity of an end user is passed to z/OS and used to map to a RACF® user ID, and any related events in the audit trail from RACF show both RACF and distributed identities. This book describes the concept of identity propagation and how it can address the end-to end accountability issue of many customers. It describes, at a high level, what identity propagation is, and why it is important to us. It shows a conceptual view of the key elements necessary to accomplish this. This book provides details on the RACMAP function, filter management and how to use the SMF records to provide an audit trail. In depth coverage is provided about the internal implementation of identity propagation, such as providing information about available callable services. This book examines the current exploiters of z/OS Identity Propagation and provide several detailed examples covering CICS® with CICS Transaction Gateway, DB2®, and CICS Web services with Datapower.

CICS and SOA: Architecture and Integration Choices

CICS and SOA: Architecture and Integration Choices
Author: Chris Rayns
Publisher: IBM Redbooks
Total Pages: 322
Release: 2012-03-26
Genre: Computers
ISBN: 0738436739

The service-oriented architecture (SOA) style of integration involves breaking an application down into common, repeatable services that can be used by other applications (both internal and external) in an organization, independent of the computing platforms on which the business and its partners rely. In recent years CICS® has added a variety of support for SOA and now provides near seamless connectivity with other IT environments. This IBM® Redbooks® publication helps IT architects to select, plan, and design solutions that integrate CICS applications as service providers and requesters. First, we provide an introduction to CICS service enablement and introduce the architectural choices and technologies on which a CICS SOA solution can be based. We continue with an in-depth analysis of how to meet functional and non-functional requirements in the areas of application interface, security, transactional scope, high availability, and scalability. Finally, we document three integration scenarios to illustrate how these technologies have been used by customers to build robust CICS integration solutions.

Using IBM CICS Transaction Server Channels and Containers

Using IBM CICS Transaction Server Channels and Containers
Author: Steve Burghard
Publisher: IBM Redbooks
Total Pages: 276
Release: 2015-03-21
Genre: Computers
ISBN: 0738440507

This IBM® Redbooks® publication describes the new channels and containers support in IBM Customer Information Control System (CICS®) Transaction Server V5.2. The book begins with an overview of the techniques used to pass data between applications running in CICS. This book describes the constraints that these data techniques might be subject to, and how a channels and containers solution can provide solid advantages alongside these techniques. These capabilities enable CICS to fully comply with emerging technology requirements in terms of sizing and flexibility. The book then goes on to describe application design, and looks at implementing channels and containers from an application programmer point of view. It provides examples to show how to evolve channels and containers from communication areas (COMMAREAs). Next, the book explains the channels and containers application programming interface (API). It also describes how this API can be used in both traditional CICS applications and a Java CICS (JCICS) applications. The business transaction services (BTS) API is considered as a similar yet recoverable alternative to channels and containers. Some authorized program analysis reports (APARs) are introduced, which enable more flexible web services features by using channels and containers. The book also presents information from a systems management point of view, describing the systems management and configuration tasks and techniques that you must consider when implementing a channels and containers solution. The book chooses a sample application in the CICS catalog manager example, and describes how you can port an existing CICS application to use channels and containers rather than using COMMAREAs.