Follow the steps in these scenarios to learn how to perform tasks such as configuring connections to CICS®, or configuring SSL security. As you work through each scenario you use real values provided in a reference table. When you have completed the configuration part of a scenario, you can then test the scenario by sending a simple ECI request to a CICS server.