Se tting Up Securi ty for TMA TCP fo r CI CS

Securing Outbound Connections from CICS to UNIX

Complete the following tasks to enable the security feature for each outbound connection.

1.Specify SECURITY=Y on the appropriate Requester screen.

2.Enter ACCOUNT and PASSWORD values on the appropriate Requester screen.

Verify that the parameter values for ACCOUNT and PASSWORD in the Requester screen match

the RMTACCT and PASSWORD values in the *FOREIGN section of the TMA TCP gateway GWICONFIG file.

When SECURITY=Y, the requester program sends the ACCOUNT and PASSWORD to the remote UNIX system on connection initiation. When SECURITY=N, the gateway attempts to make a connection without any verification.

Securing Outbound Connections from CICS to CICS

Complete the following tasks to enable the security feature for each outbound connection.

1.Specify SECURITY=Y on the appropriate Requester screen.

2.Enter ACCOUNT and PASSWORD values on the appropriate Requester screen.

Verify that the parameter values for ACCOUNT and PASSWORD in the Requester screen match the ACCOUNT and PASSWORD values in the User Connection Account screen.

When SECURITY=Y, the requester program sends the ACCOUNT and PASSWORD to the remote CICS system on connection initiation. When SECURITY=N, the gateway attempts to make a connection without any verification.

Securing Outbound Connections from CICS to IMS

Complete the following tasks to enable the security feature for each outbound connection.

1.Specify SECURITY=Y on the appropriate Requester screen.

2.Enter ACCOUNT and PASSWORD values on the appropriate Requester screen.

Verify that the parameter values for ACCOUNT and PASSWORD in the Requester screen match the ACCOUNT and PASSWORD values in the GATEWAY TYPE=REMOTE statement.

When SECURITY=Y, the requester program sends the ACCOUNT and PASSWORD to the remote IMS system on connection initiation. When SECURITY=N, the gateway attempts to make a connection without any verification.

Oracle Tuxedo Mainframe Adapter for TCP CICS User Guide

3-5

Page 33
Image 33
Oracle Audio Technologies Oracle Tuxedo manual Securing Outbound Connections from Cics to Unix