The Web services support in CICS Transaction Server Version 3.1 enables your CICS programs to be Web service providers or requesters. CICS supports a number of specifications including SOAP Version 1.1 and Version 1.2, and Web services distributed transactions (WS-Atomic Transaction).
This IBM Redbooks publication will help you configure the CICS Web services support for both HTTP and WebSphere MQ based solutions. We show how Web services can be used to integrate J2EE applications running in WebSphere Application Server with COBOL programs running in CICS.
It begins with an overview of Web services standards and the Web services support provided by CICS TS V3.1. Complete details for configuring CICS Web services using both HTTP and WebSphere MQ are provided next, along with the steps for using Web services to connect to CICS from a service integration bus. The book then shows how CICS Web services can be secured using a combination of Web Services Security (WS-Security) and transport-level security mechanisms such as SSL/TLS. Finally, it demonstrates how atomic Web services transactions can be configured to allow WebSphere and CICS resource updates to be synchronized.
This book concentrates on implementation specifics such as security, transactions, and availability. The companion book Developing CICS Web Services (SG24-7126) presents detailed information about developing CICS Web services.
Table of contents
Part 1. Introduction
Chapter 1. Overview of Web services
Chapter 2. CICS support for Web services
Part 2. Web service configuration
Chapter 3. Web services using HTTP
Chapter 4. Web services using WebSphere MQ
Chapter 5. Connecting CICS to the service integration bus
Part 3. Security management
Chapter 6. Elements of cryptography
Chapter 7. Crypto hardware and ICSF
Chapter 8. Securing Web services
Chapter 9. Security scenarios
Chapter 10. Security scenarios using CICS WS-Security support
Part 4. Transaction management
Chapter 11. Introduction to Web services: Atomic transactions
Chapter 12. Enabling atomic transactions
Chapter 13. Transaction scenarios
Appendix A. Sample handler programs
Appendix B. How the DES, AES, SHA-1 and HMAC algorithms work
Others who downloaded this publication also downloaded