Securing Access to CICS Within an SOA

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on December 12, 2006

  1. .PDF (2.8 MB)


Share this page:   

ISBN-10: 0738496715
ISBN-13: 9780738496719
IBM Form #: SG24-5756-01


Authors: Chris Rayns, Tony Delmenico, Peter Havercan, Mary Rees, Steven Webb and Rob Weiss

    menu icon

    Abstract

    With the emergence of service-oriented architecture (SOA), the options for accessing the existing IBM Customer Information Control System (CICS) assets have become more varied than ever. With this variety comes the complexity of securing these assets. This IBM Redbooks publication is intended for IT architects who are involved in the process of selecting, planning, and designing a secure SOA solution that makes use of CICS assets.

    This book introduces SOA and the options available for transforming CICS assets into SOA solutions. It then discusses the principles of security, followed by the different security technologies.

    The book then reviews each technology individually, discussing the security options that are available, the security architectures such as basic authentication, firewalls, and the use of Secure Sockets Layer (SSL) and public key infrastructure (PKI).

    Table of Contents

    Part 1. Security and CICS SOA access

    Chapter 1. Introduction to SOA and CICS

    Chapter 2. Security concepts

    Chapter 3. Security technologies

    Part 2. Designing the secure CICS SOA solution

    Chapter 4. CICS Web services

    Chapter 5. CICS Web support

    Chapter 6. CICS Transaction Gateway

    Chapter 7. WebSphere MQ

    Chapter 8. CICS Enterprise JavaBeans support

     

    Others who read this also read