The CICS Transaction Gateway (CICS TG) is widely used to provide access to CICS COMMAREA-based programs and 3270 transactions from Java environments. This IBM Redbooks publication shows you how to build a robust CICS TG configuration for a variety of different configurations.
First we introduce the facilities of the CICS TG, followed by step-by-step explanations of how to use the different protocols (TCP/IP, TCP62, APPC and EXCI) used for communication with a CICS TS V2.2 region on z/OS, and how to secure your CICS region when receiving External Call Interface (ECI) or External Presentation Interface (EPI) requests.
Next, we provide details on how to configure the CICS TG V5 on either z/OS or Linux to connect a Java client application to a CICS region. The use of the Secure Sockets Layer (SSL) protocol to encrypt the communication from the Java application to the CICS TG is included in these scenarios.
Finally, we offer two scenarios to illustrate how to configure WebSphere Application Server V4 on the Windows or z/OS platforms, to use the supplied ECI resource adapter to allow J2EE applications to make ECI calls to CICS.
Table of contents
Part 1 Introduction
Chapter 1. CICS Transaction Gateway
Part 2 Configuring CICS connections
Chapter 2. APPC connections to CICS
Chapter 3. TCP62 connections to CICS
Chapter 4. EXCI connections to CICS
Chapter 5. TCP/IP connections to CICS
Chapter 6. CICS TG security scenarios
Part 3 Gateway daemon scenarios
Chapter 7. TCP connections to the Gateway daemon on z/OS
Chapter 8. SSL connections to the Gateway daemon on z/OS
Chapter 9. TCP connections to the Gateway daemon on Linux
Part 4 WebSphere scenarios
Chapter 10. CICS TG and WebSphere Application Server for z/OS
Chapter 11. CICS TG and WebSphere Application Server for Windows
Part 5 Appendixes
Appendix A. DFHCNV and CICS data conversion
Appendix B. Sample applications
Appendix C. Additional material