This part discusses how you can secure your applications when CICS® participates
in a client-server configuration, using TCP/IP communication protocols.
About security for TCP/IP clients
TCP/IP connections between clients and servers — especially when
they use the internet — are vulnerable to attack by malicious parties. Protection
is provided in a number of different ways.
Configuring CICS to use SSL
CICS can use the Secure Sockets Layer (SSL) or the Transport
Layer Security (TLS) security protocols to support secure TCP/IP connections.
To authenticate servers to clients, create certificates and key rings
in RACF and ensure that the CICS region and resources are correctly
configured to support security.