Security credentials and the CICS resource adapters

Security Credentials for accessing CICS® can come from three different places.

These are the ConnectionSpec properties, the deployed security credentials, or the server itself (for nonmanaged environments, the third option does not apply). The precedence for these credentials is:
  1. The Server Supplied Credentials (highest precedence)
  2. The ConnectionSpec Supplied Credentials
  3. The Deployed Security Credentials.

Managed enterprise applications can be deployed with "container" or "application" as a security choice. If "container" is specified, the JEE application server will provide the credentials by means of a user interface. If "application" is specified, security is determined from the deployment properties and can be overridden by the ConnectionSpec.


Information Information

Feedback


Timestamp icon Last updated: Tuesday, 19 November 2013


https://ut-ilnx-r4.hursley.ibm.com/tg_latest/help/topic/com.ibm.cics.tg.doc//progde/j2eesec.html