Security
This chapter introduces the security considerations when connecting applications to CICS programs with CICS Transaction Gateway (CICS TG). It then describes how the CICS TG addresses the issues of authentication, authorization, data integrity, and confidentiality. It also examines how CICS and CICS TG work together with an external security manager, such as Resource Access Control Facility (RACF), to provide these facilities. Details are included that describe the mechanisms used to secure connections and to transmit security credentials ...