CICS® Transaction Gateway provides a secure way of connecting to CICS using standard security mechanisms. These mechanisms integrate with security provided by the JEE application server and with security provided by CICS.
Network security is the ability to provide authentication and encryption over a network connection using these security technologies:
Underlying security technologies such as Internet Protocol Security (IPSec) are also supported.
User authentication is the process by which a service verifies a user's authenticity. Verification is through the use of credentials, usually a password or a certificate. User authentication can be implemented for all protocols.
Link security prevents a remote user from attaching to a transaction in CICS, or accessing a resource for which the link user ID has no authority. Link security provides an additional check on user authentication through the use of a preset user ID on the CICS server connection. Link security can be implemented for the IPIC and EXCI protocols.
Bind security prevents an unauthorized remote system from connecting to CICS. Bind security can be implemented for the IPIC and EXCI protocols.