Security Checking from UNIX to Mainframe

Figure 3-1depicts the process flow for security verifications from TMA TCP for CICS on UNIX to a mainframe.

Figure 3-1 Security Checking for UNIX to Mainframe Transactions

 

UNIX

2

 

 

BEA TMA TCP

 

Gateway

Tuxedo

 

Client

1

 

Mainframe

3

 

4

 

 

 

 

Application

Handler

Handler

 

 

 

5

 

 

Remote

 

 

Server

1.When the TMA TCP gateway client program performs a tpinit(), the user’s Tuxedo identity is validated against the tpusr file.

2.When the client program issues a tpcall() or tpacall(), Tuxedo verifies (against the tpacl file) the user is authorized to invoke the gateway service.

3.When the gateway establishes the initial connection, connection security information (specified as RMTNAME and PASSWORD in the GWICONFIG file) is passed from the TMA TCP gateway to the remote gateway. If the RMTNAME and PASSWORD values match the values configured on the remote gateway, the connection is established.

With each request, the TMA TCP gateway passes the user’s Tuxedo identity to the remote TMA TCP for CICS gateway (to the Handler).

Note: To pass authority checking, the user’s Tuxedo identity must match the mainframe user ID exactly.

4.The remote TMA TCP for CICS gateway Handler initiates an Application Handler to act on behalf of the specified user ID.

3-2

Oracle Tuxedo Mainframe Adapter for TCP CICS User Guide

Page 30
Image 30
Oracle Audio Technologies Oracle Tuxedo manual Security Checking from Unix to Mainframe