O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Migration to CICS Transaction Server for z/VSE V2.1

Book Description

Abstract

The IBM® CICS® Transaction Server for z/VSE® (CICS TS for z/VSE) 2.1 provides functions to improve application programming, system programming, system management, and data security and availability. With CICS TS for z/VSE 2.1, you can use the extended functionality of Basic Security Manager. CICS TS for z/VSE 2.1 can be administrated by the IBM CICS Explorer® function on a workstation, which allows CICS management in a convenient way.

This IBM Redbooks® publication provides information to help you install, tailor, and configure the CICS TS for z/VSE 2.1 product. The book is intended for IBM z/VSE customers and IBM technical personnel who are responsible for planning and migrating to IBM z/VSE 6.1 and CICS TS for z/VSE 2.1.

The book also provides information to help you understand the affect of migrating to CICS TS for z/VSE 2.1. It provides detailed guidance and samples for installing and configuring CICS TS for z/VSE 2.1.
Also included in the book is a description of the CICS TS for z/VSE 2.1 features and capabilities and the affect of removing obsolete functions. The book also covers security and performance issues and provides samples for first level problem determination through the use of memory dumps or the use of trace tools.

Table of Contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. Preface
    1. Authors
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  4. Chapter 1. Introduction
    1. 1.1 z/VSE 6.1 overview
      1. 1.1.1 CICS TS for z/VSE 2.1
      2. 1.1.2 Other items notable in z/VSE 6.1
      3. 1.1.3 Migration issues
      4. 1.1.4 Migration planning summary
    2. 1.2 z/VSE Version 6: What will be next
  5. Chapter 2. Installation and tailoring
    1. 2.1 Planning
      1. 2.1.1 Planning steps for installation
      2. 2.1.2 Hardware considerations
      3. 2.1.3 Software considerations
      4. 2.1.4 Other considerations
    2. 2.2 Installing z/VSE 6.1 and CICS Transaction Server
    3. 2.3 Tailoring the CICS Transaction Server
      1. 2.3.1 Reviewing virtual storage requirements for CICS TS
      2. 2.3.2 Using a CICS system definition data set file
      3. 2.3.3 Defining system files for a second CICS TS
      4. 2.3.4 Customizing the DFHSIT table
      5. 2.3.5 Customizing the DFHPLT tables
      6. 2.3.6 Tailoring the CICS start-up job stream
      7. 2.3.7 Autoinstall of resources
    4. 2.4 Migration from CICS/VSE 2.3
      1. 2.4.1 Migrating the DFHPCT and DFHPPT tables
      2. 2.4.2 Customizing and migrating the DFHFCT table
      3. 2.4.3 Migrating the DFHTCT table
      4. 2.4.4 Other considerations
  6. Chapter 3. Security
    1. 3.1 z/VSE Version 6 Release 1 security
      1. 3.1.1 z/VSE V6R1 security options
      2. 3.1.2 Basic security manager
      3. 3.1.3 Security Server
      4. 3.1.4 Batch security with DTSECTAB
      5. 3.1.5 BSM logging and reporting
      6. 3.1.6 System Authorization Facility
      7. 3.1.7 Maintaining BSM security profiles
      8. 3.1.8 Migrating BSM profiles
      9. 3.1.9 BSM cross-reference reports
      10. 3.1.10 External security manager installation
    2. 3.2 CICS Transaction Server for z/VSE 2.1 security
      1. 3.2.1 CICS TS Sign-on security provided by the BSM
      2. 3.2.2 User sign-on and sign-off
      3. 3.2.3 User password checking
      4. 3.2.4 CICS TS security parameters
      5. 3.2.5 CICS TS transaction-attach security
      6. 3.2.6 CICS default user ID
      7. 3.2.7 Security for program list table programs at startup
      8. 3.2.8 Resource security checking
      9. 3.2.9 Command security checking not supported by BSM
      10. 3.2.10 Surrogate user security
      11. 3.2.11 Security on intercommunication
      12. 3.2.12 CICS Report Controller
      13. 3.2.13 Printer security
      14. 3.2.14 Terminal security
    3. 3.3 Security Migration Aid
    4. 3.4 Summary
  7. Chapter 4. CICS Explorer
    1. 4.1 Overview of CICS Explorer Workbench
      1. 4.1.1 Selecting CICS Explorer views
    2. 4.2 Supported Operations views
    3. 4.3 Supported CICS Management Interface resources
      1. 4.3.1 Using an HTTP GET request for information about resources
      2. 4.3.2 Using an HTTP PUT request to process a single resource
    4. 4.4 Restrictions when connecting to a CICS TS for z/VSE system
    5. 4.5 Installing and configuring the CICS Explorer
      1. 4.5.1 Configuring the z/VSE host for use with CICS Explorer
      2. 4.5.2 Starting and stopping the CICS Explorer server-part
      3. 4.5.3 Obtaining a copy of the CICS Explorer Client
      4. 4.5.4 Installing CICS Explorer Client
    6. 4.6 Configuring a new connection to a CICS system
      1. 4.6.1 Adding a set of CICS Explorer credentials
      2. 4.6.2 Adding a CICS Explorer connection
    7. 4.7 Using a connection to a CICS system
      1. 4.7.1 Changing a CICS Explorer user workspace
    8. 4.8 Using Job EYUPARM to enter or modify debugging commands
    9. 4.9 Messages generated when using the CICS Explorer
  8. Chapter 5. Web support
    1. 5.1 Connection security
      1. 5.1.1 Transport-layer security versus message-layer security
    2. 5.2 Using SOAP for inter-program communication
      1. 5.2.1 z/VSE support for web services and SOAP overview
      2. 5.2.2 SOAP syntax overview
      3. 5.2.3 Web Service Security overview
      4. 5.2.4 Using authentication with web Service Security
      5. 5.2.5 How the z/VSE host can act as the SOAP server
      6. 5.2.6 Using web Service Security features when z/VSE acts as the SOAP server
      7. 5.2.7 How the z/VSE host can act as the SOAP client
      8. 5.2.8 Using web Service Security features when z/VSE acts as the SOAP client
    3. 5.3 3270 bridge
      1. 5.3.1 DFHWBTTA
      2. 5.3.2 Programs with BMS support
    4. 5.4 ECI/CICS Transaction Gateway
      1. 5.4.1 How the ECI and CICS Transaction Gateway are used
      2. 5.4.2 How the CICS Transaction Gateway accesses CICS
      3. 5.4.3 External Call Interface
    5. 5.5 CICS Listener
    6. 5.6 Evaluation
  9. Chapter 6. Channels and containers
    1. 6.1 COMMAREA overview
    2. 6.2 Passing data requirements
    3. 6.3 Channels and containers approach
      1. 6.3.1 General concepts
      2. 6.3.2 Channels
      3. 6.3.3 Containers
      4. 6.3.4 CICS read-only containers
      5. 6.3.5 Data conversion
      6. 6.3.6 Benefits of using channels and containers
      7. 6.3.7 Porting COMMAREA to channels and containers
      8. 6.3.8 Converting COMMAREA to channels example
  10. Chapter 7. CICS customization
    1. 7.1 System generation
    2. 7.2 Initialization and termination processing
      1. 7.2.1 System initialization overlays (CICS/VSE)
      2. 7.2.2 Program list table programs
    3. 7.3 User exits
    4. 7.4 Global user exits
      1. 7.4.1 Task-related user exits
    5. 7.5 User-replaceable modules
      1. 7.5.1 z/VSE-supplied URMs
    6. 7.6 System programmer interfaces
      1. 7.6.1 System programming macros
      2. 7.6.2 Programmable interface to CEMT
      3. 7.6.3 System Programming Interface
  11. Chapter 8. Performance and tuning
    1. 8.1 Virtual storage considerations
      1. 8.1.1 VSE startup parameters
      2. 8.1.2 Shared Virtual Area
      3. 8.1.3 CICS partition layout
      4. 8.1.4 Storage requirements for maximum task specification
    2. 8.2 System resource requirements
      1. 8.2.1 Real storage considerations
    3. 8.3 Statistics and monitoring
      1. 8.3.1 Setting up the DMF
      2. 8.3.2 Statistics
      3. 8.3.3 Monitoring
  12. Chapter 9. CICS application program considerations
    1. 9.1 Compatibility
      1. 9.1.1 Changes to API commands in CICS TS
      2. 9.1.2 Changes to rounding for ASKTIME and FORMATTIME commands
      3. 9.1.3 Changes to INQUIRE SYSTEM command
    2. 9.2 Migrating macro-level applications
      1. 9.2.1 DFHMSCAN
      2. 9.2.2 CICS Application Migration Aid
    3. 9.3 z/VSE compile dialogs
    4. 9.4 CICS Basic Mapping Support (BMS)
  13. Chapter 10. CICS problem determination
    1. 10.1 CICS Transaction Server for z/VSE 2.1 environment overview
    2. 10.2 CICS tracing
      1. 10.2.1 Trace levels
      2. 10.2.2 Control options
      3. 10.2.3 Default SIT options
      4. 10.2.4 CETR overview
      5. 10.2.5 Using CETR
      6. 10.2.6 Tracing scenarios
      7. 10.2.7 Trace formatting
    3. 10.3 CICS dumps
      1. 10.3.1 Preparing for stand-alone dump
      2. 10.3.2 Processing the CICS dump from a stand-alone disk
      3. 10.3.3 Program check and abend information
      4. 10.3.4 Default SIT options
    4. 10.4 DUMP TABLE facility
      1. 10.4.1 Overview
      2. 10.4.2 Transaction Dump table
      3. 10.4.3 System Dump table
      4. 10.4.4 Dump suppression for ASRA and ASRB abends
    5. 10.5 CSFE and CEDF
      1. 10.5.1 Changes to the CSFE DEBUG transaction
      2. 10.5.2 CEDF support for remote transactions
  14. Appendix A. IBM-supplied CSD groups
  15. Appendix B. CICS TS statistics output examples
    1. Sample Statistics Program output
  16. Related publications
    1. IBM Redbooks
    2. Other publications
    3. Online resources
    4. Help from IBM
  17. Back cover