Skip to main content

CICS Transaction Gateway for z/OS Version 6.1

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.


Published on 22 May 2006

  1. .PDF (5.2 MB)

Share this page:   

ISBN-10: 0738496227
ISBN-13: 9780738496221
IBM Form #: SG24-7161-00

Authors: Chris Rayns, Colin Alcock, Steven Day, Tommy Joergensen, Rob Jones, Phil Wakelin and Nigel Williams

    menu icon


    The CICS Transaction Gateway (CICS TG) is used widely to provide access to CICS programs from Java environments. It provides the IBM implementation of the J2EE Connector Architecture (JCA).

    This IBM Redbooks publication introduces the new facilities of the CICS TG for z/OS V6.0 and V6.1, which provide improvements in the areas of transactional integration, systems management, performance, security, and ease of use.

    Included in this book are a set of configuration scenarios for a variety of different deployment topologies for integrating J2EE applications on WebSphere Application Server with CICS TS for z/OS. This book provides step-by-step explanations about how to configure connections between each tier of the test environment. We show you how to enable support for global transactions which span resources on different systems. We also cover the configuration of CICS TG security, including the use of JSSE for establishing secure SSL connections to the CICS TG.

    Table of Contents

    Part 1. Introduction

    Chapter 1. CICS Transaction Gateway

    Chapter 2. Installing and configuring the CICS TG

    Part 2. Connection Management

    Chapter 3. Gateway daemon connections

    Chapter 4. Connecting from WebSphere Application Server for z/OS

    Part 3. Transaction Management

    Chapter 5. Gateway daemon transactions

    Chapter 6. Gateway daemon transactions with TCP/IP load balancing

    Chapter 7. Transactions with WebSphere Application Server for z/OS

    Part 4. Security Management

    Chapter 8. Gateway daemon security

    Chapter 9. Enabling SSL with the Gateway daemon

    Chapter 10. Security with WebSphere Application Server for z/OS

    Part 5. Appendixes

    Appendix A. Sample applications

    Appendix B. DFHCNV and CICS data conversion

    Appendix C. EXCI Trace

    Appendix D. Additional material


    Others who read this also read