Skip to main content

Liberty in IBM CICS: Deploying and Managing Java EE Applications

An IBM Redbooks publication

thumbnail 

Published on 18 January 2018, updated 29 March 2018

  1. .EPUB (5.7 MB)
  2. .PDF (11.1 MB)

Apple BooksGoogle Play Books

Share this page:   

ISBN-10: 073844216X
ISBN-13: 9780738442167
IBM Form #: SG24-8418-00


Authors: Phil Wakelin, Carlos Donatucci, Jonathan Lawrence, Mitch Johnson, Michael Jones and Tito Paiva

    menu icon

    Abstract

    This IBM® Redbooks® publication is intended for IBM CICS® system programmers and IBM Z architects. It describes how to deploy and manage Java EE 7 web-based applications in an IBM CICS Liberty JVM server and access data on IBM Db2® for IBM z/OS® and IBM MQ for z/OS sub systems.

    In this book, we describe the key steps to create and install a Liberty JVM server within a CICS region. We then describe how to best use the different deployment techniques for Java EE applications and the specific considerations when deploying applications that use JDBC, JMS, and the new CICS link to Liberty API.

    Finally, we describe how to secure web applications in CICS Liberty, including transport-level security and request authentication and authorization by using IBM RACF® and LDAP registries. Information is also provided about how to build a high availability infrastructure and how to use the logging and monitoring functions that are available in the CICS Liberty environment.

    This book is based on IBM CICS Transaction Server (CICS TS) V5.4 that uses the embedded IBM WebSphere® Application Server Liberty technology. It is also applicable to CICS TS V5.3 with the fixes for the continuous delivery APAR PI77502 applied. Sample applications are used throughout this publication and are freely available for download from the IBM CICSDev GitHub organization along with detailed deployment instructions.

    Table of Contents

    Chapter 1. Installation and configuration

    Chapter 2. Deploying a web application

    Chapter 3. Link to Liberty

    Chapter 4. Connecting to Db2 by using JDBC

    Chapter 5. Connecting to IBM MQ by using JMS

    Chapter 6. Configuring Transport Layer Security support

    Chapter 7. Securing web applications

    Chapter 8. Logging and monitoring

    Chapter 9. Port sharing and cloning regions

     

    Others who read this also read