CICS System Manager in the WUI as the Principle Management Interface

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 16 November 2007

  1. .PDF (5.7 MB)


Share this page:   

ISBN-10: 0738486663
ISBN-13: 9780738486666
IBM Form #: SG24-6793-01


Authors: Chris Rayns, Gordon Keehn, Adrian Ray, John Dobler and Daniel Donnelly

    menu icon

    Abstract

    This IBM® Redbooks® publication reviews the CICSPlex® SM Web User Interface (WUI). We first give an overview of CICSPlex SM and the WUI. In Chapter 2, "CICSPlex SM installation" on page 13, we show an installation for first time users of CICSPlex SM and the WUI for CICSPlex SM V3.2. Chapter 3, "CICSPlex SM migration" on page 55, concentrates on how to migrate to CICSPlex SM V3.2. We discuss the migration best practices and show a migration step-by-step.

    This book also reviews the default menus delivered with the CICSPlex SM WUI and describes scenarios where these views could be used. We also discuss view modification and customization, focusing on such things as favorites and how to use the view editor.

    This book contains a chapter on problem determination. In that chapter we discuss problems that may be discovered and fixed using the CICSPlex SM WUI. Typical problems that we concentrate on are problems with files and in storage, as well as usage of the history facility.

    In the final few chapters of this book we look at CICSPlex SM security and describe how to implement SSL in the CICSPlex SM WUI. The last chapter of this book gives the reader some hints and tips on problems encountered, and considerations when using the CICSPlex SM WUI.

    Table of Contents

    Chapter 1. CICSPlex SM overview

    Chapter 2. CICSPlex SM installation

    Chapter 3. CICSPlex SM migration

    Chapter 4. CICSPlex SM Web User Interface default menus and views

    Chapter 5. WUI view modification and customization

    Chapter 6. Problem determination

    Chapter 7. Hints and tips

    Chapter 8. Security

    Appendix A. Additional material

     

    Others who read this also read