8.1 Security basics8.1.1 The components of a security system8.1.2 The role of cryptography8.2 Network security8.2.1 Secure Sockets Layer and Transport Layer Security8.2.2 Digital signatures, certificates, and key rings8.2.3 Enabling SSL in the CICS TG8.2.4 Securing IPIC connections8.2.5 Securing connections to the Gateway daemon8.3 Passwords, PassTickets, and password phrases8.4 Identity propagation8.5 The external security interface