Authorizing surrogate users  Chapter 5: Tracing and Accounting

Chapter 4: Security

Sybase listener security checking

The new Sybase listener performs security checking for users connecting both through a three-tier, gateway-enabled, and a two-tier, gateway-less environment. This section explains which user ID is associated with the Sybase listener and the processing for both of these scenarios.

This section contains the following subsections:


User ID associated with the listener

Sybase recommends that you start the Sybase listener through the CICS Program List Table (PLT). Add a DFHPLT entry for the SYBOPEN program, which establishes the TCP environment based on values defined in IxTCP. You can add the DFHPLT entry after the DFHDELIM entry since the SYBOPEN program runs in the third stage of initialization.

Use the SIT PLTIUSR parameter to assign a user ID to your PLT programs. All PLT programs run under the transaction ID CPLT. If XUSER=YES in the SIT, surrogate authorization is checked before the CPLT transaction ID is attached. The CICS region userid must be authorized as a surrogate for the PLTIUSR userid. If a value is not specified for the PLTIUSR parameter, no surrogate checking is done, and PLT programs run under the authorization of the CICS region userid.

You can use the SYOP transaction to start the Sybase listeners if you choose not to use the PLT or if you need to restart the listeners while CICS is running. In using the SYOP transaction, listeners run under the authorization of the user ID signed on to the terminal. If no user is signed on to the terminal, the CICS default user ID is used.


Three-tier, gateway-enabled processing

The Sybase listener uses the client user ID and password as input to the EXEC CICS VERIFY PASSWORD command. Verification proceeds as follows:


Two-tier, gateway-less processing

The Sybase listener uses the client user ID and password as input to the EXEC CICS VERIFY PASSWORD command. Verification proceeds as follows:





Copyright © 2005. Sybase Inc. All rights reserved. Chapter 5: Tracing and Accounting

View this book as PDF