CICS Transaction Gateway for z/OS Version 6.1
An IBM Redbooks publication
Note: This is publication is now archived. For reference only.
Published 22 May 2006
IBM Form #: SG24-7161-00
Rate and comment
Authors: Chris Rayns, Colin Alcock, Steven Day, Tommy Joergensen, Rob Jones, Phil Wakelin, Nigel Williams
The CICS Transaction Gateway (CICS TG) is used widely to provide access to CICS programs from Java environments. It provides the IBM implementation of the J2EE Connector Architecture (JCA).
This IBM Redbooks publication introduces the new facilities of the CICS TG for z/OS V6.0 and V6.1, which provide improvements in the areas of transactional integration, systems management, performance, security, and ease of use.
Included in this book are a set of configuration scenarios for a variety of different deployment topologies for integrating J2EE applications on WebSphere Application Server with CICS TS for z/OS. This book provides step-by-step explanations about how to configure connections between each tier of the test environment. We show you how to enable support for global transactions which span resources on different systems. We also cover the configuration of CICS TG security, including the use of JSSE for establishing secure SSL connections to the CICS TG.
Table of contents
Part 1. Introduction
Chapter 1. CICS Transaction Gateway
Chapter 2. Installing and configuring the CICS TG
Part 2. Connection Management
Chapter 3. Gateway daemon connections
Chapter 4. Connecting from WebSphere Application Server for z/OS
Part 3. Transaction Management
Chapter 5. Gateway daemon transactions
Chapter 6. Gateway daemon transactions with TCP/IP load balancing
Chapter 7. Transactions with WebSphere Application Server for z/OS
Part 4. Security Management
Chapter 8. Gateway daemon security
Chapter 9. Enabling SSL with the Gateway daemon
Chapter 10. Security with WebSphere Application Server for z/OS
Part 5. Appendixes
Appendix A. Sample applications
Appendix B. DFHCNV and CICS data conversion
Appendix C. EXCI Trace
Appendix D. Additional material
Others who read this publication also read
Follow IBM Redbooks
Follow IBM Redbooks