Liberty in IBM CICS: Deploying and Managing Java EE Applications
An IBM Redbooks publication
Published 18 January 2018, updated 29 March 2018
IBM Form #: SG24-8418-00
Rate and comment
Authors: Phil Wakelin, Carlos Donatucci, Jonathan Lawrence, Mitch Johnson, Michael Jones, Tito Paiva
This IBM® Redbooks® publication is intended for IBM CICS® system programmers and IBM Z architects. It describes how to deploy and manage Java EE 7 web-based applications in an IBM CICS Liberty JVM server and access data on IBM Db2® for IBM z/OS® and IBM MQ for z/OS sub systems.
In this book, we describe the key steps to create and install a Liberty JVM server within a CICS region. We then describe how to best use the different deployment techniques for Java EE applications and the specific considerations when deploying applications that use JDBC, JMS, and the new CICS link to Liberty API.
Finally, we describe how to secure web applications in CICS Liberty, including transport-level security and request authentication and authorization by using IBM RACF® and LDAP registries. Information is also provided about how to build a high availability infrastructure and how to use the logging and monitoring functions that are available in the CICS Liberty environment.
This book is based on IBM CICS Transaction Server (CICS TS) V5.4 that uses the embedded IBM WebSphere® Application Server Liberty technology. It is also applicable to CICS TS V5.3 with the fixes for the continuous delivery APAR PI77502 applied. Sample applications are used throughout this publication and are freely available for download from the IBM CICSDev GitHub organization along with detailed deployment instructions.
Table of contents
Chapter 1. Installation and configuration
Chapter 2. Deploying a web application
Chapter 3. Link to Liberty
Chapter 4. Connecting to Db2 by using JDBC
Chapter 5. Connecting to IBM MQ by using JMS
Chapter 6. Configuring Transport Layer Security support
Chapter 7. Securing web applications
Chapter 8. Logging and monitoring
Chapter 9. Port sharing and cloning regions
Others who read this publication also read
Follow IBM Redbooks
Follow IBM Redbooks