An example of signing on with APPC PEM

This example shows the sequence of events when a user signs on to a PEM client with an expired password. The sequence is illustrated in Figure 1 .
  1. The user attempts to sign on to the PEM client, and supplies a password.
  2. The PEM client sends the user ID and password to the CICS PEM server.
  3. The CICS PEM server passes the user ID and password to the external security manager.
  4. The external security manager checks the password.
  5. Because the password has expired, the sign on attempt fails. The external security manager informs the CICS PEM server, which, in turn, informs the PEM client.
  6. The PEM client informs the user that the password has expired, and requests a new one.
  7. The user enters a new password.
  8. The PEM client sends the user ID, the old password, and the new password to the CICS PEM server.
  9. The CICS PEM server passes the user ID, the old password, and the new password to the external security manager.
  10. The external security manager checks the old and new password.Because a new passowrd is provided, the sign on attempt is succesful. The external security manager informs the CICS PEM server, which, in turn, informs the PEM client.
  11. The PEM client informs the user that the sign on request has been successful.
Figure 1. Example of signing on with APPC PEM
This figure illustrates the sequence of events when a user signs on to a PEM client with an expired password. The sequence is described in the text.