The TRUE Exit  Configuration

Appendix C: Configuring TCP/IP connectivity

How the listener handles security

Security is handled differently based upon which release of CICS the environment is running under and whether the environment is three-tier or two-tier. This section contains security information for:


CICS 4.x

For CICS 4.x, a CICS VERIFY is run against the user ID and password.


Three-tier, gateway-enabled mode

In a three-tier environment, security is handled as follows:


Two-tier, gateway-less mode

In a two-tier environment, security is handled as follows:

The listener then resumes its listening state.





Copyright © 2005. Sybase Inc. All rights reserved. Configuration

View this book as PDF