CICS Transaction Gateway V5 The WebSphere Connector for CICS
An IBM Redbooks publication
Published 22 August 2002, updated 26 June 2009
IBM Form #: SG24-6133-01
Authors: Phil Wakelin, John Joro, Kevin Kinney, David Seager
The CICS Transaction Gateway (CICS TG) is widely used to provide access to CICS COMMAREA-based programs and 3270 transactions from Java environments. This IBM Redbooks publication shows you how to build a robust CICS TG configuration for a variety of different configurations.
First we introduce the facilities of the CICS TG, followed by step-by-step explanations of how to use the different protocols (TCP/IP, TCP62, APPC and EXCI) used for communication with a CICS TS V2.2 region on z/OS, and how to secure your CICS region when receiving External Call Interface (ECI) or External Presentation Interface (EPI) requests.
Next, we provide details on how to configure the CICS TG V5 on either z/OS or Linux to connect a Java client application to a CICS region. The use of the Secure Sockets Layer (SSL) protocol to encrypt the communication from the Java application to the CICS TG is included in these scenarios.
Finally, we offer two scenarios to illustrate how to configure WebSphere Application Server V4 on the Windows or z/OS platforms, to use the supplied ECI resource adapter to allow J2EE applications to make ECI calls to CICS.
Table of contents
Part 1 Introduction
Chapter 1. CICS Transaction Gateway
Part 2 Configuring CICS connections
Chapter 2. APPC connections to CICS
Chapter 3. TCP62 connections to CICS
Chapter 4. EXCI connections to CICS
Chapter 5. TCP/IP connections to CICS
Chapter 6. CICS TG security scenarios
Part 3 Gateway daemon scenarios
Chapter 7. TCP connections to the Gateway daemon on z/OS
Chapter 8. SSL connections to the Gateway daemon on z/OS
Chapter 9. TCP connections to the Gateway daemon on Linux
Part 4 WebSphere scenarios
Chapter 10. CICS TG and WebSphere Application Server for z/OS
Chapter 11. CICS TG and WebSphere Application Server for Windows
Part 5 Appendixes
Appendix A. DFHCNV and CICS data conversion
Appendix B. Sample applications
Appendix C. Additional material
Others who read this publication also read
Follow IBM Redbooks
Follow IBM Redbooks